Active Defense: A Comprehensive Guide to Network Security - Softcover

Brenton, Chris; Hunt, Cameron

 
9780782129168: Active Defense: A Comprehensive Guide to Network Security

Synopsis

  • Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies.

  • Superb coverage of all security threats (internal and external) and ways to combat them. Includes coverage of Virtual Private Networks, the newest encryption technologies, firewalls, and much more!

  • Coverage includes Windows, including Windows 2000, and sections on Unix and Linux.

"synopsis" may belong to another edition of this title.

About the Author

Chris Brenton is a network consultant specializing in network security and multiprotocol environments. He is the author of several Sybex books, including Mastering Cisco Routers.

Cameron Hunt is a network professional specializing in information security. He has worked for the US military and a wide range of corporations. He currently serves as a trainer and consultant.

From the Back Cover

  • Develop a Systematic Approach to Network Security
  • Limit Your Exposure to Viruses and Minimize Damage When They Strike
  • Choose a Firewall and Configure it to Serve Your Exact Needs
  • Monitor Your Network and React Effectively to Hackers

Get the Know–How To Optimize Today′s Leading Security Technologies

Today′s networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead of mischief and thievery.

Active Defense: A Comprehensive Guide to Network Security gives you precisely the knowledge and expertise you′re looking for. You′ll work smarter by day, and sleep easier by night.

Coverage Includes:

  • Configuring Cisco router security features
  • Selecting and configuring a firewall
  • Configuring and Intrusion Detection System
  • Providing data redundancy
  • Configuring a Virtual Private Network
  • Implementing authentication and encryption technologies
  • Recognizing hacker attacks
  • Getting up–to–date security information
  • Locking down Windows NT and 2000 servers
  • Securing UNIX, Linux, and FreeBSD systems
  • Protecting NetWare servers from attack

Features on the CD
On the enclosed CD you′ll find evaluation copies of a wide range of security software including firewalls (FireWall–1 and Guardian); a vulnerability detection system (Internet Scanner); and a performance monitoring tool (NMS).

"About this title" may belong to another edition of this title.