Internet Lockdown: Internet Security Administrator's Handbook - Softcover

Crothers, Tim

 
9780764548611: Internet Lockdown: Internet Security Administrator's Handbook

Inhaltsangabe

Learn how to achieve superior Internet security without having to spend an arm and a leg! Most people who are charged with handling their company's security have no formal training in the area. Taking the theory behind security and provides real-world implementation examples and techniques, this book will allow them to get "hands-on" with real-world examples, tips and tricks. Topics provided with extensive coverage include: practical implementation steps for firewalls, intrusion detection and prevention, network security, honeypots, encryption, certificates and cryptography.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorin bzw. den Autor

Tim Crothers, CCNA, CIW, MCSE, MCT, CNE, is the chief security engineer at ITM Technology LLC, a firm that offers leading-edge Internet threat management services. A specialist in TCP/IP, WAN architecture, and security, he consults, trans, and assesses security risks at companies such as IBM, Lucent Technologies, UPS, and Anderson Worldwide. He also speaks frequently on security issues at Internet World, E-Commerce Exposition, Comdex, e-Business Expo, and other industry events.

Von der hinteren Coverseite

"In Internet Lockdown, Tim Crothers navigates the confusion surrounding Internet security by combining the same practical, intelligent approach he contributes to the revolutionary threat management solutions of ITM Technology LLC." ––Daniel M. Helmholdt, Managing Partner, ITM Technology LLC

There′s no such thing as 100 percent security – unless you unplug your hardware and bury it. But there are a lot of things you can do to minimize the risk of intrusion, many of which are relatively easy (and inexpensive) to accomplish. Written by a top security expert and peppered with real–world insights and anecdotes, this authoritative book shows you how to map out a balanced, practical security plan. The author pinpoints all of today′s most popular Internet attacks. He describes in detail the kinds of security controls you need to put in place at each level of your system. And he walks you through a vivid security implementation example, spotlighting the issues you need to address each step of the way. Get the Practical Know–How You Need to Protect Your System
∗ Ward off trouble with solid end–user policies and procedures
∗ Lock down your system with the correct configurations and removal of unnecessary services
∗ Harness Intrusion detection and honeypots to pinpoint and counteract penetrations
∗ Get a handle on best practices for security administration
∗ Learn how to assess threats, and avoid, control, and transfer risks
∗ Understand vulnerabilities in RPC, BIND, RDS, Sendmail, and other favorite cracker targets
∗ Use cryptography, firewalls, and VPNs to ensure network data integrity as well as confidentiality, authentication, and non–repudiation
∗ Prevent CGI attacks, buffer overflows, and other remote intrusions with server –side application controls
∗ Plan, implement, test, and verify a multi–layered security infrastructure
www.hungryminds.com

Aus dem Klappentext

"In Internet Lockdown, Tim Crothers navigates the confusion surrounding Internet security by combining the same practical, intelligent approach he contributes to the revolutionary threat management solutions of ITM Technology LLC." --Daniel M. Helmholdt, Managing Partner, ITM Technology LLC

There's no such thing as 100 percent security - unless you unplug your hardware and bury it. But there are a lot of things you can do to minimize the risk of intrusion, many of which are relatively easy (and inexpensive) to accomplish. Written by a top security expert and peppered with real-world insights and anecdotes, this authoritative book shows you how to map out a balanced, practical security plan. The author pinpoints all of today's most popular Internet attacks. He describes in detail the kinds of security controls you need to put in place at each level of your system. And he walks you through a vivid security implementation example, spotlighting the issues you need to address each step of the way.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.