Security Complete, 2/e
暫譯: 安全完全指南,第二版

Greg Jarboe, Hollis Thomases, Mari Smith, Chris Treadaway Dave Evans, Sybex Inc

  • 出版商: Sybex
  • 出版日期: 2002-09-12
  • 售價: $1,140
  • 貴賓價: 9.5$1,083
  • 語言: 英文
  • 頁數: 992
  • 裝訂: Paperback
  • ISBN: 0782141447
  • ISBN-13: 9780782141443
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

This second edition of Security Complete is a one-of-a-kind bookvaluable both for its broad content and its low price. The book contains the essentials you need to know about securing your environmentfrom evaluating how much security you really need to auditing a Linux network system.


The book also takes you into various operating systems including Windows 2000, Windows XP, Linux, and NetWare, showing you the tips and tricks to securing each one. Get up to speed on encryption, firewalls, and the industry's top security certifications, and soon you'll be able to ensure the security of your home and business networks.

Security Complete introduces you to the work of some of Sybex's finest authors, so you'll know where to go to learn even more about protecting your valuable assets.

Inside:
Network Security Fundamentals

  • A Systems Approach to Information Networks
  • Security as a Process
  • A Bird's-Eye View of Topology Security
  • Authentication and Encryption

Operating Systems and Servers
Windows 2000 Security
  • Living with Windows XP Professional Strict Security
  • Securing Your NetWare 6 Network
  • Linux System Monitoring and Auditing
  • Samba Security Considerations

Firewalls
  • Understanding Firewalls
  • Packet Filtering
  • Network Address Translation
  • Windows Firewalls
  • Unix and Linux Network-Layer Firewalls

Cisco Security Specialization (CSS1) Highlights
  • PIX Firewall Configuration
  • Introduction to Virtual Private Networks
  • Introduction to Cisco VPN Devices
  • Installing Cisco Secure IDS Sensors and IDSMs
  • Sensor Configuration

Security-Related MCSE Highlights
  • Evaluating the Impact of Security Design on the Technical Environment
  • Designing Windows 2000 Security Baselines
  • Designing the Security Solution

Contents

Introduction

Part I • Network Security Fundamentals
Chapter 1 • A Systems Approach to Information Networks
Adapted from Mastering™ Network Security, Second Edition

Chapter 2 • Security as a Process
Adapted from Mastering Network Security, Second Edition

Chapter 3 • A Bird 's-Eye View of Topology Security
Adapted from Mastering Network Security, Second Edition

Chapter 4 • Authentication and Encryption
Adapted from Mastering Network Security, Second Edition

Part II • Operating Systems and Servers
Chapter 5 • Windows 2000 Security
Adapted from Windows® 2000 Server: 24seven ™

Chapter 6 • Living with Windows XP Professional Strict Security
Adapted from Mastering Windows XP Professional

Chapter 7 • Securing Your NetWare® 6 Server
Adapted from Mastering NetWare 6

Chapter 8 • Linux System Installation and Setup
Adapted from Linux Security

Chapter 9 • Linux System Monitoring and Auditing
Adapted from Linux Security

Chapter 10 • Samba Security Considerations
Adapted from Linux Samba Server Administration

Part III • Firewalls
Chapter 11 • Understanding Firewalls
Adapted from Firewalls 24seven, Second Edition

Chapter 12 • Packet Filtering
Adapted from Firewalls 24seven, Second Edition

Chapter 13 • Network Address Translation
Adapted from Firewalls 24seven, Second Edition

Chapter 14 • Windows Firewalls
Adapted from Firewalls 24seven, Second Edition

Chapter 15 • Unix Firewalls
Adapted from Firewalls 24seven, Second Edition

Chapter 16 • Linux Network-Layer Firewalls
Adapted from Linux Security

Part IV • Cisco Security Specialist (CSS1) Highlights
Chapter 17 • PIX Firewall Basics
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study Guide

Chapter 18 • PIX Firewall Configuration
Adapted from CSS1/CCIP: Cisco Security Specialist Study Guide

Chapter 19 • Introduction to Virtual Private Networks
Adapted from CSS1/CCIP: Cisco Security Specialist Study Guide

Chapter 20 • Introduction to Cisco VPN Devices
Adapted from CSS1/CCIP: Cisco Security Specialist Study Guide

Chapter 21 • Installing Cisco Secure IDS Sensors and IDSMs
Adapted from CSS1/CCIP: Cisco Security Specialist Study Guide

Chapter 22 • Sensor Configuration
Adapted from CSS1/CCIP: Cisco Security Specialist Study Guide

Part V • Security-Related MCSE Highlights
Chapter 23 • Evaluating the Impact of the Security Design on the Technical Environment
Adapted from MCSE: Windows 2000 Network Security Design Study Guide, Second Edition

Chapter 24 • Designing Security Baselines
Adapted from MCSE: Windows 2000 Network Security Design

Chapter 25 • Designing the Security Solution
Adapted from MCSE: Windows 2000 Netw

商品描述(中文翻譯)

這本《Security Complete》的第二版是一本獨一無二的書籍——其廣泛的內容和低廉的價格都非常有價值。這本書包含了您需要了解的有關保護環境的基本知識——從評估您實際需要多少安全性到審核 Linux 網路系統。

這本書還帶您進入各種作業系統,包括 Windows 2000、Windows XP、Linux 和 NetWare,展示了保護每個系統的技巧和竅門。了解加密、防火牆以及行業內頂尖的安全認證,您將能夠確保家庭和商業網路的安全。

《Security Complete》向您介紹了一些 Sybex 最優秀作者的作品,讓您知道可以去哪裡學習更多有關保護您寶貴資產的知識。

內部內容:
網路安全基礎
- 系統方法論於資訊網路
- 安全性作為一個過程
- 拓撲安全的全景觀
- 認證與加密

作業系統與伺服器
- Windows 2000 安全性
- 與 Windows XP 專業版嚴格安全共存
- 保護您的 NetWare 6 網路
- Linux 系統監控與審核
- Samba 安全考量

防火牆
- 理解防火牆
- 封包過濾
- 網路地址轉換
- Windows 防火牆
- Unix 和 Linux 網路層防火牆

Cisco 安全專業化 (CSS1) 精華
- PIX 防火牆配置
- 虛擬私人網路簡介
- Cisco VPN 設備簡介
- 安裝 Cisco Secure IDS 感測器和 IDSM
- 感測器配置

安全相關的 MCSE 精華
- 評估安全設計對技術環境的影響
- 設計 Windows 2000 安全基準
- 設計安全解決方案

內容
引言

第一部分 • 網路安全基礎
第 1 章 • 系統方法論於資訊網路
改編自《Mastering™ Network Security, Second Edition》

第 2 章 • 安全性作為一個過程
改編自《Mastering Network Security, Second Edition》

第 3 章 • 拓撲安全的全景觀
改編自《Mastering Network Security, Second Edition》

第 4 章 • 認證與加密
改編自《Mastering Network Security, Second Edition》

第二部分 • 作業系統與伺服器
第 5 章 • Windows 2000 安全性
改編自《Windows® 2000 Server: 24seven™》

第 6 章 • 與 Windows XP 專業版嚴格安全共存
改編自《Mastering Windows XP Professional》

第 7 章 • 保護您的 NetWare® 6 伺服器
改編自《Mastering NetWare 6》

第 8 章 • Linux 系統安裝與設置
改編自《Linux Security》

第 9 章 • Linux 系統監控與審核
改編自《Linux Security》

第 10 章 • Samba 安全考量
改編自《Linux Samba Server Administration》

第三部分 • 防火牆
第 11 章 • 理解防火牆
改編自《Firewalls 24seven, Second Edition》

第 12 章 • 封包過濾
改編自《Firewalls 24seven, Second Edition》

第 13 章 • 網路地址轉換
改編自《Firewalls 24seven, Second Edition》

第 14 章 • Windows 防火牆
改編自《Firewalls 24seven, Second Edition》

第 15 章 • Unix 防火牆
改編自《Firewalls 24seven, Second Edition》

第 16 章 • Linux 網路層防火牆
改編自《Linux Security》

第四部分 • Cisco 安全專家 (CSS1) 精華
第 17 章 • PIX 防火牆基礎
改編自《CSS1™/CCIP™: Cisco® Security Specialist Study Guide》

第 18 章 • PIX 防火牆配置
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》

第 19 章 • 虛擬私人網路簡介
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》

第 20 章 • Cisco VPN 設備簡介
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》

第 21 章 • 安裝 Cisco Secure IDS 感測器和 IDSM
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》

第 22 章 • 感測器配置
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》

第五部分 • 安全相關的 MCSE 精華
第 23 章 • 評估安全設計對技術環境的影響
改編自《MCSE: Windows 2000 Network Security Design Study Guide, Second Edition》

第 24 章 • 設計安全基準
改編自《MCSE: Windows 2000 Network Security Design》

第 25 章 • 設計安全解決方案
改編自《MCSE: Windows 2000 Netw