Synopses & Reviews
The Technology You Need is Out There. The Expertise You Need is inHere.
Expertise is what makes hackers effective.It’s what will make you effective, too, as you fight to keep them at bay.Mastering Network Security has been fully updated to reflect the latestdevelopments in security technology, but it does much more than bring you up todate. More importantly, it gives you a comprehensive understanding of the threatsto your organization’s network and teaches you a systematic approach inwhich you make optimal use of the technologies available to you. Coverageincludes:
- Understanding security from a topologicalperspective
- Configuring Cisco router security features
- Selecting andconfiguring a firewall
- Configuring Cisco’s PIX firewall
- Configuringan intrusion detection system
- Providing data redundancy
- Configuring aVirtual Private Network
- Securing your wireless network
- Implementingauthentication and encryption solutions
- Recognizing hackerattacks
- Detecting and eradicating viruses
- Getting up-to-date securityinformation
- Locking down Windows NT/2000/XP servers
- Securing UNIX, Linux, and FreBSD systems
Security is the hottest topic in IT, as well as everywhere else. The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security information grows. This new edition of the highly acclaimed and best-selling Mastering Network Security provides a systematic and practical approach to assessing threats to the network and implementing workable and effective security measures to avert them. Coverage ranges from physical network security to data theft and viruses.
About the Author
Chris Brenton is the author of several Sybex books, including Mastering Cisco Routers. Brenton is a network consultant specializing in implementing network security and troubleshooting multiprotocol environments. Cameron Hunt is a network consultant and trainer.
Table of Contents
Chapter 1: A Systems Analysis Approach to Information Technology.
Chapter 2: Security as a Process.
Chapter 3: Understanding How Network Systems Communicate.
Chapter 4: Topology Security.
Chapter 5: Firewalls.
Chapter 6: Cisco?s PIX Firewall.
Chapter 7: Intrusion Detection Systems.
Chapter 8: Authentication and Encryption.
Chapter 9: Virtual Private Networking.
Chapter 10: Viruses, Trojans, and Worms.
Chapter 11: Disaster Prevention and Recovery.
Chapter 12: The Wide World of Windows.
Chapter 13: Unix-Based Systems.
Chapter 14: The Anatomy ofan Attack.
Chapter 15: Security Resources.
Appendix A: Operating System Security Checklists.
Appendix B: Sample Network Usage Policy.