How to Cheat at Securing Your Network Contributor(s): Dubrawsky, Ido (Author) |
|
ISBN: 1597492310 ISBN-13: 9781597492317 Publisher: Syngress Publishing OUR PRICE: $51.43 Product Type: Paperback - Other Formats Published: October 2007 Annotation: Most Sys Admins are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distills it into concise recommendations and instructions, using real world, step-by-step instruction. The book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. This book is the latest addition to the best selling "How to Cheat..." series of IT handbooks. * Covers the most likely threats to the typical small to medium size network * Concise information perfect for busy Sys Admins with little spare time * Covers what to do when disaster strikes your network |
Additional Information |
BISAC Categories: - Computers | Security - General |
Dewey: 005.822 |
LCCN: 2007281938 |
Series: How to Cheat |
Physical Information: 1" H x 7.58" W x 9.24" (1.93 lbs) 432 pages |
Descriptions, Reviews, Etc. |
Publisher Description: Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction. The latest addition to the best selling How to Cheat... series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. |