Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Mastering Network Security

Mastering Network Security

List Price: $49.99
Your Price: $32.99
Product Info Reviews

Description:

In Mastering Network Security, Chris Brenton presents a complete portrait of all the things that can go wrong with a computer network and provides a thorough discussion of the tools available to counteract them. This book proceeds to explain how malicious software, external attackers, angry insiders, software bugs, and other evil entities can bring down a system. Most of the focus here, however, is on system attacks from the outside. Brenton devotes much attention to the tools you can use to thwart attackers.

This book walks the reader through a security audit and the process of developing an effective security policy. While some of the author's advice in this area may seem like common sense, it's helpful to have the many related issues summarized. Then, on the theory that it's easier to secure territory you know well, Brenton provides an overview of internetworking technologies--notably, Virtual Private Networks (VPNs)--and their inherent security characteristics.

Mastering Network Security shows how to implement security measures--including logging, encryption, and packet filtering--on your existing network infrastructure. (He provides specifics for Unix, Windows NT, Cisco IOS, and NetWare). The author also writes at length about supplementary security measures such as firewalls (especially Firewall-1), intrusion detection systems (focusing on RealSecure), and RAID data redundancy (with emphasis on OctopusHA+). --David Wall

© 2004, ReviewFocus or its affiliates