Limit this search to....

How to Cheat at Securing Your Network
Contributor(s): Dubrawsky, Ido (Author)
ISBN: 1597492310     ISBN-13: 9781597492317
Publisher: Syngress Publishing
OUR PRICE:   $51.43  
Product Type: Paperback - Other Formats
Published: October 2007
Qty:
Annotation: Most Sys Admins are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distills it into concise recommendations and instructions, using real world, step-by-step instruction.
The book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.
This book is the latest addition to the best selling "How to Cheat..." series of IT handbooks.
* Covers the most likely threats to the typical small to medium size network
* Concise information perfect for busy Sys Admins with little spare time
* Covers what to do when disaster strikes your network
Additional Information
BISAC Categories:
- Computers | Security - General
Dewey: 005.822
LCCN: 2007281938
Series: How to Cheat
Physical Information: 1" H x 7.58" W x 9.24" (1.93 lbs) 432 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction.

The latest addition to the best selling How to Cheat... series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.