Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
How to cheat at securing your network
~
Dubrawsky, Ido.
How to cheat at securing your network
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
How to cheat at securing your network/ [Ido Dubrawksy, technical editor].
其他題名:
Securing your network
其他作者:
Dubrawsky, Ido.
出版者:
Burlington, MA :Syngress,c2007.
面頁冊數:
xix, 409 p. :ill. ;24 cm.
附註:
Includes index.
叢書名:
"How to cheat--"
標題:
Computer networks - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.loc.gov/catdir/enhancements/fy0838/2007281938-d.html
ISBN:
9780080558646 (electronic bk.)
ISBN:
008055864X (electronic bk.)
ISBN:
9781597492317 (paper)
ISBN:
1597492310 (paper)
How to cheat at securing your network
How to cheat at securing your network
[electronic resource] /Securing your network[Ido Dubrawksy, technical editor]. - Burlington, MA :Syngress,c2007. - xix, 409 p. :ill. ;24 cm. - "How to cheat--".
Includes index.
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrity, and authentication will help you. .See the Components of a PKI System Lean how CAs maintain and issue digital certificates, RAs handle the verification process, and more.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2008.
Mode of access: World Wide Web.
ISBN: 9780080558646 (electronic bk.)Subjects--Topical Terms:
146868
Computer networks
--Security measures.Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: TK5105.59 / .H684 2007eb
Dewey Class. No.: 005.8
How to cheat at securing your network
LDR
:03759cmm 22003254a 4500
001
1000045975
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
081212s2007 maua s 001 0 eng d
020
$a
9780080558646 (electronic bk.)
020
$a
008055864X (electronic bk.)
020
$a
9781597492317 (paper)
020
$a
1597492310 (paper)
035
$a
(OCoLC)281598267
035
$a
ocn281598267
040
$a
OPELS
$b
eng
$c
OPELS
$d
OPELS
050
1 4
$a
TK5105.59
$b
.H684 2007eb
082
0 4
$a
005.8
$2
22{me_controlnum}
245
0 0
$a
How to cheat at securing your network
$h
[electronic resource] /
$c
[Ido Dubrawksy, technical editor].
246
3 0
$a
Securing your network
260
$a
Burlington, MA :
$b
Syngress,
$c
c2007.
300
$a
xix, 409 p. :
$b
ill. ;
$c
24 cm.
440
0
$a
"How to cheat--"
500
$a
Includes index.
520
$a
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrity, and authentication will help you. .See the Components of a PKI System Lean how CAs maintain and issue digital certificates, RAs handle the verification process, and more.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2008.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Dec. 9, 2008).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
146868
650
0
$a
Computer security.
$3
146870
655
7
$a
Electronic books.
$2
local.
$3
172687
700
1
$a
Dubrawsky, Ido.
$3
190696
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597492317
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492317
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0838/2007281938-d.html
0 筆讀者評論
館藏地:
全部
線上資料庫 (Online Resource)
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040132
線上資料庫 (Online Resource)
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入