Sunday, December 28, 2008

How to Cheat at Securing Your Network


The perfect tool for Sys Admins responsible for more than just security.

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction.

The latest addition to the bestselling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.

. Get an Introduction to AAA
See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing.
. Understand the Types of Attacks
Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks.
. Address Remote Access Problems
Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems.
. Review Wireless Technologies
Understand WAP and IEEE 802/11 WLAN wireless security methods.
. Web Servers are Critical Network Components
Make sure that they are as safe as possible and know the issues regarding Web services.
. Know the Differences Between Device-Based and Media-Based Security
See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network.
. See the Concepts and Processes of OS and NOS Hardening
Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment.
. Understand the Basics of Cryptography
See how confidentiality, integrity, and authentication will help you.
. See the Components of a PKI System
Lean how CAs maintain and issue digital certificates, RAs handle the verification process, and more.

Download:
Link_1
.

0 comments:

Post a Comment | Feed

Post a Comment



Related Posts with Thumbnails
 

Blog Archive

Recent Posts

  © Free E-Books U ask v provide by Free E-Books Download 2012

Disclaimer: This blog does not store any files on its server.We only index and link to content provided by sites.

USER AGREEMENT PLEASE READ : The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These links here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. If you want to remove links to your website, Please send an email to professionalstudents[at]gmail[dot]com.