買這商品的人也買了...
-
$3,070$2,917 -
$990Integrating Linux and Windows (Paperback)
-
$399Cisco Networking Academy Program: Fundamentals of UNIX Companion Guide (Hardcover)
-
$875Special Edition Using Optical Networks
-
$580$493 -
$99101 Killer Apps for Your Palm Handheld (Paperback)
-
$199101 Ways to Promote Your Web Site: Filled with Proven Internet Marketing Tips, Tools, Techniques, and Resources to Increase Your Web Site Traffic, 5/e
-
$780$741 -
$550$435 -
$980$774 -
$680$578 -
$500$450 -
$1,200$948 -
$350$298 -
$880$695 -
$640$506 -
$990$891 -
$600$480 -
$720$569 -
$580$458 -
$650$514 -
$580$458 -
$780$616 -
$650$514 -
$1,180$932
相關主題
商品描述
This second edition of Security Complete is a one-of-a-kind book—valuable both for its broad content and its low price. The book contains the essentials you need to know about securing your environment—from evaluating how much security you really need to auditing a Linux network system.
The book also takes you into various operating systems including Windows
2000, Windows XP, Linux, and NetWare, showing you the tips and tricks to
securing each one. Get up to speed on encryption, firewalls, and the industry's
top security certifications, and soon you'll be able to ensure the security of
your home and business networks.
Security Complete introduces you
to the work of some of Sybex's finest authors, so you'll know where to go to
learn even more about protecting your valuable
assets.
Inside:
Network Security Fundamentals
- A Systems Approach to Information Networks
- Security as a Process
- A Bird's-Eye View of Topology Security
- Authentication and Encryption
Operating Systems and Servers
Windows 2000 Security
- Living with Windows XP Professional Strict Security
- Securing Your NetWare 6 Network
- Linux System Monitoring and Auditing
- Samba Security Considerations
Firewalls
- Understanding Firewalls
- Packet Filtering
- Network Address Translation
- Windows Firewalls
- Unix and Linux Network-Layer Firewalls
Cisco Security Specialization (CSS1) Highlights
- PIX Firewall Configuration
- Introduction to Virtual Private Networks
- Introduction to Cisco VPN Devices
- Installing Cisco Secure IDS Sensors and IDSMs
- Sensor Configuration
Security-Related MCSE Highlights
- Evaluating the Impact of Security Design on the Technical Environment
- Designing Windows 2000 Security Baselines
- Designing the Security Solution
Contents
Introduction
Part I • Network Security
Fundamentals
Chapter 1 • A Systems Approach to Information
Networks
Adapted from Mastering™ Network Security, Second
Edition
Chapter 2 • Security as a Process
Adapted from Mastering
Network Security, Second Edition
Chapter 3 • A Bird 's-Eye View of
Topology Security
Adapted from Mastering Network Security, Second
Edition
Chapter 4 • Authentication and Encryption
Adapted from
Mastering Network Security, Second Edition
Part II • Operating Systems
and Servers
Chapter 5 • Windows 2000 Security
Adapted from Windows® 2000
Server: 24seven ™
Chapter 6 • Living with Windows XP Professional Strict
Security
Adapted from Mastering Windows XP Professional
Chapter 7 •
Securing Your NetWare® 6 Server
Adapted from Mastering NetWare 6
Chapter 8 • Linux System Installation and Setup
Adapted from Linux
Security
Chapter 9 • Linux System Monitoring and Auditing
Adapted from
Linux Security
Chapter 10 • Samba Security Considerations
Adapted from
Linux Samba Server Administration
Part III • Firewalls
Chapter 11 •
Understanding Firewalls
Adapted from Firewalls 24seven, Second
Edition
Chapter 12 • Packet Filtering
Adapted from Firewalls 24seven,
Second Edition
Chapter 13 • Network Address Translation
Adapted from
Firewalls 24seven, Second Edition
Chapter 14 • Windows
Firewalls
Adapted from Firewalls 24seven, Second Edition
Chapter 15 •
Unix Firewalls
Adapted from Firewalls 24seven, Second Edition
Chapter
16 • Linux Network-Layer Firewalls
Adapted from Linux Security
Part IV
• Cisco Security Specialist (CSS1) Highlights
Chapter 17 • PIX Firewall
Basics
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study
Guide
Chapter 18 • PIX Firewall Configuration
Adapted from CSS1/CCIP:
Cisco Security Specialist Study Guide
Chapter 19 • Introduction to
Virtual Private Networks
Adapted from CSS1/CCIP: Cisco Security Specialist
Study Guide
Chapter 20 • Introduction to Cisco VPN Devices
Adapted
from CSS1/CCIP: Cisco Security Specialist Study Guide
Chapter 21 •
Installing Cisco Secure IDS Sensors and IDSMs
Adapted from CSS1/CCIP: Cisco
Security Specialist Study Guide
Chapter 22 • Sensor
Configuration
Adapted from CSS1/CCIP: Cisco Security Specialist Study
Guide
Part V • Security-Related MCSE Highlights
Chapter 23 •
Evaluating the Impact of the Security Design on the Technical
Environment
Adapted from MCSE: Windows 2000 Network Security Design Study
Guide, Second Edition
Chapter 24 • Designing Security
Baselines
Adapted from MCSE: Windows 2000 Network Security
Design
Chapter 25 • Designing the Security Solution
Adapted from MCSE:
Windows 2000 Netw
商品描述(中文翻譯)
這本《Security Complete》的第二版是一本獨一無二的書籍——其廣泛的內容和低廉的價格都非常有價值。這本書包含了您需要了解的有關保護環境的基本知識——從評估您實際需要多少安全性到審核 Linux 網路系統。
這本書還帶您進入各種作業系統,包括 Windows 2000、Windows XP、Linux 和 NetWare,展示了保護每個系統的技巧和竅門。了解加密、防火牆以及行業內頂尖的安全認證,您將能夠確保家庭和商業網路的安全。
《Security Complete》向您介紹了一些 Sybex 最優秀作者的作品,讓您知道可以去哪裡學習更多有關保護您寶貴資產的知識。
內部內容:
網路安全基礎
- 系統方法論於資訊網路
- 安全性作為一個過程
- 拓撲安全的全景觀
- 認證與加密
作業系統與伺服器
- Windows 2000 安全性
- 與 Windows XP 專業版嚴格安全共存
- 保護您的 NetWare 6 網路
- Linux 系統監控與審核
- Samba 安全考量
防火牆
- 理解防火牆
- 封包過濾
- 網路地址轉換
- Windows 防火牆
- Unix 和 Linux 網路層防火牆
Cisco 安全專業化 (CSS1) 精華
- PIX 防火牆配置
- 虛擬私人網路簡介
- Cisco VPN 設備簡介
- 安裝 Cisco Secure IDS 感測器和 IDSM
- 感測器配置
安全相關的 MCSE 精華
- 評估安全設計對技術環境的影響
- 設計 Windows 2000 安全基準
- 設計安全解決方案
內容
引言
第一部分 • 網路安全基礎
第 1 章 • 系統方法論於資訊網路
改編自《Mastering™ Network Security, Second Edition》
第 2 章 • 安全性作為一個過程
改編自《Mastering Network Security, Second Edition》
第 3 章 • 拓撲安全的全景觀
改編自《Mastering Network Security, Second Edition》
第 4 章 • 認證與加密
改編自《Mastering Network Security, Second Edition》
第二部分 • 作業系統與伺服器
第 5 章 • Windows 2000 安全性
改編自《Windows® 2000 Server: 24seven™》
第 6 章 • 與 Windows XP 專業版嚴格安全共存
改編自《Mastering Windows XP Professional》
第 7 章 • 保護您的 NetWare® 6 伺服器
改編自《Mastering NetWare 6》
第 8 章 • Linux 系統安裝與設置
改編自《Linux Security》
第 9 章 • Linux 系統監控與審核
改編自《Linux Security》
第 10 章 • Samba 安全考量
改編自《Linux Samba Server Administration》
第三部分 • 防火牆
第 11 章 • 理解防火牆
改編自《Firewalls 24seven, Second Edition》
第 12 章 • 封包過濾
改編自《Firewalls 24seven, Second Edition》
第 13 章 • 網路地址轉換
改編自《Firewalls 24seven, Second Edition》
第 14 章 • Windows 防火牆
改編自《Firewalls 24seven, Second Edition》
第 15 章 • Unix 防火牆
改編自《Firewalls 24seven, Second Edition》
第 16 章 • Linux 網路層防火牆
改編自《Linux Security》
第四部分 • Cisco 安全專家 (CSS1) 精華
第 17 章 • PIX 防火牆基礎
改編自《CSS1™/CCIP™: Cisco® Security Specialist Study Guide》
第 18 章 • PIX 防火牆配置
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》
第 19 章 • 虛擬私人網路簡介
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》
第 20 章 • Cisco VPN 設備簡介
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》
第 21 章 • 安裝 Cisco Secure IDS 感測器和 IDSM
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》
第 22 章 • 感測器配置
改編自《CSS1/CCIP: Cisco Security Specialist Study Guide》
第五部分 • 安全相關的 MCSE 精華
第 23 章 • 評估安全設計對技術環境的影響
改編自《MCSE: Windows 2000 Network Security Design Study Guide, Second Edition》
第 24 章 • 設計安全基準
改編自《MCSE: Windows 2000 Network Security Design》
第 25 章 • 設計安全解決方案
改編自《MCSE: Windows 2000 Netw