買這商品的人也買了...
-
$3,010$2,860 -
$990Integrating Linux and Windows (Paperback)
-
$399Cisco Networking Academy Program: Fundamentals of UNIX Companion Guide (Hardcover)
-
$875Special Edition Using Optical Networks
-
$580$458 -
$99101 Killer Apps for Your Palm Handheld (Paperback)
-
$199101 Ways to Promote Your Web Site: Filled with Proven Internet Marketing Tips, Tools, Techniques, and Resources to Increase Your Web Site Traffic, 5/e
-
$780$741 -
$550$468 -
$980$774 -
$680$578 -
$500$450 -
$1,200$948 -
$350$315 -
$880$616 -
$640$506 -
$990$891 -
$600$480 -
$720$612 -
$580$493 -
$650$553 -
$580$493 -
$780$616 -
$650$514 -
$1,180$1,003
相關主題
商品描述
This second edition of Security Complete is a one-of-a-kind book—valuable both for its broad content and its low price. The book contains the essentials you need to know about securing your environment—from evaluating how much security you really need to auditing a Linux network system.
The book also takes you into various operating systems including Windows
2000, Windows XP, Linux, and NetWare, showing you the tips and tricks to
securing each one. Get up to speed on encryption, firewalls, and the industry's
top security certifications, and soon you'll be able to ensure the security of
your home and business networks.
Security Complete introduces you
to the work of some of Sybex's finest authors, so you'll know where to go to
learn even more about protecting your valuable
assets.
Inside:
Network Security Fundamentals
- A Systems Approach to Information Networks
- Security as a Process
- A Bird's-Eye View of Topology Security
- Authentication and Encryption
Operating Systems and Servers
Windows 2000 Security
- Living with Windows XP Professional Strict Security
- Securing Your NetWare 6 Network
- Linux System Monitoring and Auditing
- Samba Security Considerations
Firewalls
- Understanding Firewalls
- Packet Filtering
- Network Address Translation
- Windows Firewalls
- Unix and Linux Network-Layer Firewalls
Cisco Security Specialization (CSS1) Highlights
- PIX Firewall Configuration
- Introduction to Virtual Private Networks
- Introduction to Cisco VPN Devices
- Installing Cisco Secure IDS Sensors and IDSMs
- Sensor Configuration
Security-Related MCSE Highlights
- Evaluating the Impact of Security Design on the Technical Environment
- Designing Windows 2000 Security Baselines
- Designing the Security Solution
Contents
Introduction
Part I • Network Security
Fundamentals
Chapter 1 • A Systems Approach to Information
Networks
Adapted from Mastering™ Network Security, Second
Edition
Chapter 2 • Security as a Process
Adapted from Mastering
Network Security, Second Edition
Chapter 3 • A Bird 's-Eye View of
Topology Security
Adapted from Mastering Network Security, Second
Edition
Chapter 4 • Authentication and Encryption
Adapted from
Mastering Network Security, Second Edition
Part II • Operating Systems
and Servers
Chapter 5 • Windows 2000 Security
Adapted from Windows® 2000
Server: 24seven ™
Chapter 6 • Living with Windows XP Professional Strict
Security
Adapted from Mastering Windows XP Professional
Chapter 7 •
Securing Your NetWare® 6 Server
Adapted from Mastering NetWare 6
Chapter 8 • Linux System Installation and Setup
Adapted from Linux
Security
Chapter 9 • Linux System Monitoring and Auditing
Adapted from
Linux Security
Chapter 10 • Samba Security Considerations
Adapted from
Linux Samba Server Administration
Part III • Firewalls
Chapter 11 •
Understanding Firewalls
Adapted from Firewalls 24seven, Second
Edition
Chapter 12 • Packet Filtering
Adapted from Firewalls 24seven,
Second Edition
Chapter 13 • Network Address Translation
Adapted from
Firewalls 24seven, Second Edition
Chapter 14 • Windows
Firewalls
Adapted from Firewalls 24seven, Second Edition
Chapter 15 •
Unix Firewalls
Adapted from Firewalls 24seven, Second Edition
Chapter
16 • Linux Network-Layer Firewalls
Adapted from Linux Security
Part IV
• Cisco Security Specialist (CSS1) Highlights
Chapter 17 • PIX Firewall
Basics
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study
Guide
Chapter 18 • PIX Firewall Configuration
Adapted from CSS1/CCIP:
Cisco Security Specialist Study Guide
Chapter 19 • Introduction to
Virtual Private Networks
Adapted from CSS1/CCIP: Cisco Security Specialist
Study Guide
Chapter 20 • Introduction to Cisco VPN Devices
Adapted
from CSS1/CCIP: Cisco Security Specialist Study Guide
Chapter 21 •
Installing Cisco Secure IDS Sensors and IDSMs
Adapted from CSS1/CCIP: Cisco
Security Specialist Study Guide
Chapter 22 • Sensor
Configuration
Adapted from CSS1/CCIP: Cisco Security Specialist Study
Guide
Part V • Security-Related MCSE Highlights
Chapter 23 •
Evaluating the Impact of the Security Design on the Technical
Environment
Adapted from MCSE: Windows 2000 Network Security Design Study
Guide, Second Edition
Chapter 24 • Designing Security
Baselines
Adapted from MCSE: Windows 2000 Network Security
Design
Chapter 25 • Designing the Security Solution
Adapted from MCSE:
Windows 2000 Netw