Sybex

Home Certification IT Administration Architecture & Design
3D Animation & CGI Internet Marketing
Print this page Share

Mastering†Network Security, 2nd Edition

ISBN: 978-0-7821-4142-9
512 pages
November 2002
Mastering†Network Security, 2nd Edition (0782141420) cover image
The Technology You Need is Out There. The Expertise You Need is in Here.

Expertise is what makes hackers effective. It's what will make you effective, too, as you fight to keep them at bay. Mastering Network Security has been fully updated to reflect the latest developments in security technology, but it does much more than bring you up to date. More importantly, it gives you a comprehensive understanding of the threats to your organization's network and teaches you a systematic approach in which you make optimal use of the technologies available to you. Coverage includes:

  • Understanding security from a topological perspective
  • Configuring Cisco router security features
  • Selecting and configuring a firewall
  • Configuring Cisco's PIX firewall
  • Configuring an intrusion detection system
  • Providing data redundancy
  • Configuring a Virtual Private Network
  • Securing your wireless network
  • Implementing authentication and encryption solutions
  • Recognizing hacker attacks
  • Detecting and eradicating viruses
  • Getting up-to-date security information
  • Locking down Windows NT/2000/XP servers
  • Securing UNIX, Linux, and FreBSD systems
See More

Introduction.

Chapter 1: A Systems Analysis Approach to Information Technology.

Chapter 2: Security as a Process.

Chapter 3: Understanding How Network Systems Communicate.

Chapter 4: Topology Security.

Chapter 5: Firewalls.

Chapter 6: Cisco’s PIX Firewall.

Chapter 7: Intrusion Detection Systems.

Chapter 8: Authentication and Encryption.

Chapter 9: Virtual Private Networking.

Chapter 10: Viruses, Trojans, and Worms.

Chapter 11: Disaster Prevention and Recovery.

Chapter 12: The Wide World of Windows.

Chapter 13: Unix-Based Systems.

Chapter 14: The Anatomy ofan Attack.

Chapter 15: Security Resources.

Appendix A: Operating System Security Checklists.

Appendix B: Sample Network Usage Policy.

Index.

See More
Chris Brenton is the author of several Sybex books, including Mastering Cisco Routers. Brenton is a network consultant specializing in implementing network security and troubleshooting multiprotocol environments. Cameron Hunt is a network consultant and trainer.
See More
Coverage includes:
  • Understanding security from a topological perspective
  • Configuring Cisco router security features
  • Selecting and configuring a firewall
  • Configuring Cisco’s PIX firewall
  • Configuring an intrusion detection system
  • Providing data redundancy
  • Configuring a Virtual Private Network
  • Securing your wireless network
  • Implementing authentication and encryption solutions
  • Recognizing hacker attacks
  • Detecting and eradicating viruses
  • Getting up-to-date security information
  • Locking down Windows NT/2000/XP servers
  • Securing UNIX, Linux, and FreBSD systems
See More

Related Titles