Limit this search to....

Bulletproofing Tcp/Ip-Based Windows Nt/2000 Networks
Contributor(s): Held, Gilbert (Author)
ISBN: 0471495077     ISBN-13: 9780471495079
Publisher: Wiley
OUR PRICE:   $142.45  
Product Type: Paperback
Published: June 2001
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Annotation: Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure.
"Bulletproofing TCP/IP-based Windows NT/2000 Networks" details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.
Covers how TCP/IP operates and how TCP/IP attacks occur. Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods. Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention. Uses practical real-world examples of methods used to block potential attacks. Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.


Additional Information
BISAC Categories:
- Computers | Networking - Network Protocols
- Computers | Operating Systems - Windows Server
- Technology & Engineering | Telecommunications
Dewey: 004.62
LCCN: 00068507
Physical Information: 0.69" H x 7.38" W x 9.38" (1.25 lbs) 300 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
Angriffe auf Computernetzwerke sind mehr denn je ein hei es Thema. Wie können Sie Ihre Infrastruktur schützen? Ausführlich behandelt werden Strategien und Tricks hier insbesondere für TCP/IP-basierte Windows-NT- und Windows-2000-Netze. Sie erfahren das wichtigste über Router-Zugriffslisten, Firewalls, Virenscanner und Verschlüsselungsmethoden. Beispiele für Hard- und Softwarekonfigurationen, die sich besonders zur Abwehr von Hackerattacken eignen, runden das Buch sinnvoll und praxisorientiert ab.