Guide to tactical perimeter defense: becoming a security network specialist
โ Scribed by Randy Weaver
- Publisher
- Thomson/Course Technology
- Year
- 2008
- Tongue
- English
- Leaves
- 592
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the Security Certified Network Specialist certification (SCO-451), this book includes coverage of network security threats and goals, advanced TCP/IP concepts, router security, intrusion detection, firewall design and configuration, IPSec and virtual private network (VPN) design, and wireless network design and security.
๐ SIMILAR VOLUMES
In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen. Paying
Network Perimeter Security: Building Defense In-Depth reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and create a budget based upon that policy. It assists them in designing the security model and outlines the testing process. Th
The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how t
<p><b>Master the art of detecting and averting advanced network security attacks and techniques</b></p><h2>About This Book</h2><ul><li>Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark</li><li>Become an exper
Master the art of detecting and averting advanced network security attacks and techniques About This Book โข Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark โข Become an expert in cracking WiFi passwords