𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

How to cheat at securing your network

✍ Scribed by Ido Dubrawsky


Publisher
Syngress
Year
2007
Tongue
German
Leaves
433
Series
''How to cheat--
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. . Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. . Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. . Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. . Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. . Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. . Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. . See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. . Understand the Basics of Cryptography See how confidentiality, integrity, and authentication will help you. . See the Components of a PKI System Lean how CAs maintain and issue digital certificates, RAs handle the verification process, and more.


πŸ“œ SIMILAR VOLUMES


How to Cheat at Securing a Wireless Netw
✍ Chris Hurley, Jan Kanclirz Jr. πŸ“‚ Library πŸ“… 2006 πŸ› Syngress 🌐 English

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors: * Denial of service (DoS) and other network layer a

How to Cheat at Securing a Wireless Netw
✍ Hurley C. etc. πŸ“‚ Library 🌐 English

Π˜Π·Π΄Π°Ρ‚Π΅Π»ΡŒΡΡ‚Π²ΠΎ Syngress Publishing, 2006, -418 pp.<div class="bb-sep"></div>You’ve been on an extended business trip and have spent the long hours of the flight drafting follow-up notes from your trip while connected to the airline’s onboard server. After deplaning, you walk through the gate and conti

How to Cheat at Voip Security (How to Ch
✍ Thomas Porter, Michael Gough πŸ“‚ Library πŸ“… 2007 🌐 English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

How to Cheat at Voip Security (How to Ch
✍ Thomas Porter, Michael Gough πŸ“‚ Library πŸ“… 2007 🌐 English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

How to Cheat at Designing Security for a
✍ Chris Ruston, Chris Peiris πŸ“‚ Library πŸ“… 2006 πŸ› Syngress 🌐 English

This guide for busy IT managers describes best practices for creating secure and available remote access to Windows Server 2003 enterprise networks. Each stage of the process is covered, from the analysis of a company's business requirements through the design of various individual components of the