買這商品的人也買了...
-
$1,930$1,834 -
$2,176Refactoring: Improving the Design of Existing Code (Hardcover)
-
$2,280$2,166 -
$1,140$1,083 -
$1,930$1,834 -
$299Internet Open Trading Protocol
-
$2,570$2,442 -
$1,300$1,235 -
$199Hacker Attack
-
$2,570$2,442 -
$299Certified Lotus Professional: Application Development Study Guide (Hardcover)
-
$1,120$1,064 -
$2,210$2,100 -
$1,590$1,511 -
$399$315 -
$399$315 -
$1,900$1,805 -
$2,250$2,138 -
$1,740$1,653 -
$1,300$1,274 -
$1,930$1,834 -
$1,260CCNA Certification Library (CCNA Self-Study, exam #640-801), 6/e
-
$399CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801) (Hardcover)
-
$450$356 -
$1,930$1,834
商品描述
Security Complete is a one-of-a-kind book--valuable both for its broad content and its low price. The book contains the essentials you need to know about securing your environment--from protecting yourself against Trojan horses to auditing your Linux system.
With Security Complete, you'll learn all about security basics
including how much security you need, how to protect yourself at home, and how
to ward off Internet pirates and hackers. The book also takes you into various
operating systems including Windows 2000, Linux, and NetWare, showing you the
tips and tricks to securing each one. Get up to speed on firewalls, remote
access solutions, and Virtual Private Networks, and soon you'll be able to
ensure the security of your home and business network.
Security
Complete introduces you to the work of some of Sybex's finest authors, so
you'll know where to go to learn even more about protecting your valuable
assets.
CONTENTS
Introduction
Part I: Network Security Fundamentals
- Chapter 1: Why Secure Your Network?
Chapter 2: How Much Security Do You Need?
Chapter 3: Understanding How Network Systems Communicate
Chapter 4: Authentication and Encryption
Part II: Computer Crime: Hacking, Cracking, Trojan Horses, Digital Piracy, and Things That Go Bump in the Night
- Chapter 5: Hackers, Crackers, and Whackers
Chapter 6: Prevention, Detection, and Elimination
Chapter 7: Digital Piracy 101
Chapter 8: Crime and Punishment: Piracy and the Law
Chapter 9: The Pirate's Basic Tools
Part III: Operating Systems and Servers: Windows 2000, Linux, and Netware
- Chapter 10: Windows 2000 Security
Chapter 11: Securing Your NetWare 5.1 Network
Chapter 12: Linux System Installation and Setup
Chapter 13: Linux System Monitoring and Auditing
Chapter 14: Linux DNS Server Administration & Security
Chapter 15: Samba Security Considerations
Part IV: Firewalls
- Chapter 16: Understanding Firewalls
Chapter 17: Packet Filtering
Chapter 18: Network Address Translation
Chapter 19: Windows NT/2000 Firewalls
Chapter 20: Unix Firewalls
Chapter 21: Linux Network-Layer Firewalls
Part V: Remote Access and Virtual Private Networks
- Chapter 22: Virtual Private Networking with Linux
Chapter 23: Windows 2000 Remote Access
Chapter 24: Other Virtual Private Networking Options
Chapter 25: Setting Up Windows RAS Clients
Part VI: Security-Related MCSE Highlights
- Chapter 26: Windows 2000 MCSE: the Impact of Security Design
Chapter 27: Windows 2000 MCSE: Security Baselines
Chapter 28: Windows 2000 MCSE: Designing the Security Solution
Index
商品描述(中文翻譯)
《Security Complete》是一本獨一無二的書籍,因其廣泛的內容和低廉的價格而具有價值。這本書包含了您需要了解的有關保護環境的基本知識——從防範木馬病毒到審計您的 Linux 系統。
透過《Security Complete》,您將學習到所有有關安全性的基本知識,包括您需要多少安全性、如何在家中保護自己,以及如何抵禦網路盜賊和駭客。這本書還將帶您了解各種作業系統,包括 Windows 2000、Linux 和 NetWare,並展示如何保護每個系統的技巧和竅門。掌握防火牆、遠端存取解決方案和虛擬私人網路的知識,您將能夠確保家庭和商業網路的安全。
《Security Complete》向您介紹了一些 Sybex 最優秀作者的作品,讓您知道可以去哪裡學習更多有關保護您寶貴資產的知識。
**內容**
引言
第一部分:網路安全基礎
- 第1章:為什麼要保護您的網路?
- 第2章:您需要多少安全性?
- 第3章:了解網路系統如何通信
- 第4章:身份驗證與加密
第二部分:電腦犯罪:駭客、破解、木馬病毒、數位盜版及夜間的怪事
- 第5章:駭客、破解者與打擊者
- 第6章:預防、檢測與消除
- 第7章:數位盜版101
- 第8章:犯罪與懲罰:盜版與法律
- 第9章:海盜的基本工具
第三部分:作業系統與伺服器:Windows 2000、Linux 和 NetWare
- 第10章:Windows 2000 安全性
- 第11章:保護您的 NetWare 5.1 網路
- 第12章:Linux 系統安裝與設置
- 第13章:Linux 系統監控與審計
- 第14章:Linux DNS 伺服器管理與安全性
- 第15章:Samba 安全考量
第四部分:防火牆
- 第16章:了解防火牆
- 第17章:封包過濾
- 第18章:網路地址轉換
- 第19章:Windows NT/2000 防火牆
- 第20章:Unix 防火牆
- 第21章:Linux 網路層防火牆
第五部分:遠端存取與虛擬私人網路
- 第22章:使用 Linux 的虛擬私人網路
- 第23章:Windows 2000 遠端存取
- 第24章:其他虛擬私人網路選項
- 第25章:設置 Windows RAS 客戶端
第六部分:與安全相關的 MCSE 重點
- 第26章:Windows 2000 MCSE:安全設計的影響
- 第27章:Windows 2000 MCSE:安全基準
- 第28章:Windows 2000 MCSE:設計安全解決方案
索引