Network Defense: Perimeter Defense Mechanisms

Network Defense: Perimeter Defense Mechanisms

EC-Council
كم أعجبك هذا الكتاب؟
ما هي جودة الملف الذي تم تنزيله؟
قم بتنزيل الكتاب لتقييم الجودة
ما هي جودة الملفات التي تم تنزيلها؟
The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification. An organization is only as strong as its weakest link. The same is true in network security. Mis-configurations, outdated software and technical glitches are often the easiest point of entry for a hacker. This book, the third in the series, is designed to teach the potential security practitioner how to harden the network infrastructure, evaluate hardware and software configurations and introduce log analysis, creating a strong foundation for Network Security Troubleshooting, response, and repair
عام:
2010
الإصدار:
1
الناشر:
Course Technology
اللغة:
english
الصفحات:
176
ISBN 10:
143548357X
ISBN 13:
9781435483576
ملف:
PDF, 5.73 MB
IPFS:
CID , CID Blake2b
english, 2010
تحميل (pdf, 5.73 MB)
جاري التحويل إلى
التحويل إلى باء بالفشل

أكثر المصطلحات والعبارات المستخدمة