Boek
If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.Collect the necessary hardware and software and assemble your own network labConfigure a bootable Linux CDExplore various methods for gathering information about existing securityIdentify automated attack and penetration toolsUnderstand cryptographic systems and encryption and authentication attacksLearn to find, identify, and defeat malwareAddress the special protection needs of wireless systemsUse Snort(r) to build an IDS that will help to detect and identify attacks in real timeDVD includes tools for actually building and implementing security solutionsOpen source toolsDemo softwareA bootable version of Linux «
Boeklezers.nl is een netwerk voor sociaal lezen. Wij helpen lezers nieuwe boeken en schrijvers ontdekken, en brengen lezers met elkaar en schrijvers in contact. Meer lezen »
Er zijn nog geen recensies voor dit boek.