๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Guide to tactical perimeter defense: becoming a security network specialist

โœ Scribed by Randy Weaver


Publisher
Thomson/Course Technology
Year
2008
Tongue
English
Leaves
592
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the Security Certified Network Specialist certification (SCO-451), this book includes coverage of network security threats and goals, advanced TCP/IP concepts, router security, intrusion detection, firewall design and configuration, IPSec and virtual private network (VPN) design, and wireless network design and security.


๐Ÿ“œ SIMILAR VOLUMES


Active Defense - A Comprehensive Guide t
โœ Chris Brenton, Cameron Hunt ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Sybex Inc ๐ŸŒ English

In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen. Paying

Network Perimeter Security: Building Def
โœ Cliff Riggs ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Unknown ๐ŸŒ English

Network Perimeter Security: Building Defense In-Depth reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and create a budget based upon that policy. It assists them in designing the security model and outlines the testing process. Th

Network Defense: Perimeter Defense Mecha
โœ EC-Council ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Course Technology ๐ŸŒ English

The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how t

Applied Network Security: Proven tactics
โœ Arthur Salmon, Warun Levesque, Michael McLafferty ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Master the art of detecting and averting advanced network security attacks and techniques</b></p><h2>About This Book</h2><ul><li>Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark</li><li>Become an exper

Applied Network Security: Proven tactics
โœ Arthur Salmon, Warun Levesque, Michael McLafferty ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Packt Publishing ๐ŸŒ English

Master the art of detecting and averting advanced network security attacks and techniques About This Book โ€ข Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark โ€ข Become an expert in cracking WiFi passwords