Active defense : (E-BOOK) a comprehensive guide to network security / Chris Brenton with Cameron Hunt.

By: Brenton, ChrisContributor(s): Hunt, CameronPublisher: San Francisco : Sybex, c2001Description: xxvii, 723 p. : ill. ; 23 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 0782129161Subject(s): Computer networks -- Security measures | E-BOOKDDC classification: 005.8 Online resources: Publisher description
Contents:
Chapter 1 - Why Secure Your Network? – 8 Chapter 2 - How Much Security Do You Need? – 14 Chapter 3 - Understanding How Network Systems Communicate – 27 Chapter 4 - Topology Security – 62 Chapter 5 - Firewalls – 81 Chapter 6 - Configuring Cisco Router Security Features – 116 Chapter 7 - Check Point’s FireWall-1 – 143 Chapter 8 - Intrusion Detection Systems – 168 Chapter 9 - Authentication and Encryption – 187 Chapter 10 - Virtual Private Networking – 202 Chapter 11 - Viruses, Trojans, and Worms: Oh My! – 218 Chapter 12 - Disaster Prevention and Recovery – 233 Chapter 13 - NetWare – 256 Chapter 14 - NT and Windows 2000 – 273 Chapter 15 - UNIX – 309 Chapter 16 - The Anatomy of an Attack – 334 Chapter 17 - Staying Ahead of Attacks - 352
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 005.8 CHR (Browse shelf) Link to resource Available MCSEB-620
Total holds: 0

Includes index.

Chapter 1 - Why Secure Your Network? – 8 Chapter 2 - How Much Security Do You Need? – 14 Chapter 3 - Understanding How Network Systems Communicate – 27 Chapter 4 - Topology Security – 62 Chapter 5 - Firewalls – 81 Chapter 6 - Configuring Cisco Router Security Features – 116 Chapter 7 - Check Point’s FireWall-1 – 143 Chapter 8 - Intrusion Detection Systems – 168 Chapter 9 - Authentication and Encryption – 187 Chapter 10 - Virtual Private Networking – 202 Chapter 11 - Viruses, Trojans, and Worms: Oh My! – 218 Chapter 12 - Disaster Prevention and Recovery – 233 Chapter 13 - NetWare – 256 Chapter 14 - NT and Windows 2000 – 273 Chapter 15 - UNIX – 309 Chapter 16 - The Anatomy of an Attack – 334 Chapter 17 - Staying Ahead of Attacks - 352

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.