Cerita Rakyat Indonesia - Kumpulan Cerita Cerita Rakyat Dari Indonesia

Monday, March 1, 2010

Network Security Fundamentals




Network Security Fundamentals



By Gert De Laet, Gert Schauwers

Publisher : Cisco Press

Pub Date : September 08, 2004

Pages : 480





Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems.



Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies.



Content Network Security Fundamentals ebook:

Chapter 1. Network Security Overview

Chapter 2. Understanding VulnerabilitiesThe Need for Security

Chapter 3. Understanding Defenses

Chapter 4. Cryptography

Chapter 5. Security Policies

Chapter 6. Secure Design

Chapter 7. Web Security

Chapter 8. Router Security

Chapter 9. Firewalls

Chapter 10. Intrusion Detection System Concepts

Chapter 11. Remote Access

Chapter 12. Virtual Private Networks

Chapter 13. Public Key Infrastructure

Chapter 14. Wireless Security

Chapter 15. Logging and Auditing







download this ebook

Stumble
Delicious
Technorati
Twitter
Facebook

0 Comments:

Post a Comment

Advertising

 

njajal Copyright © 2010 LKart Theme is Designed by Lasantha