• Out-of-Stock
How to Cheat at Securing Your Network
search
  • How to Cheat at Securing Your Network
ID: 172932
Ido Dubrawsky
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

Most System Administrators are not security specialists. Keeping the network secure, it is not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes a huge amount of information on the security and distillation system, using real-world, step-by-step instruction.

The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, including book access, remote access, messaging, wireless hacking, media, email threats, storage devices , and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.

. Get an Introduction to AAA
See how AAA is made up of three distinctive interdependent parts: access control, authentication, and auditing.
. Understand the Types of Attacks
Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks.
. Address Remote Access Problems
Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS +, and others were designed to address the RAS problems.
. Review Wireless Technologies
Understand WAP and IEEE 802/11 WLAN wireless security methods.
. Web Servers are Critical Network Components
Make sure that they are on the Web.
. Know the Differences Between Device-Based and Media-Based Security
See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network.
. See the Concepts and Processes of OS and NOS Hardening
Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment.
. Understand the Basics of Cryptography
See how confidentiality, integrity, and authentication will help you.
. See the Components of a PKI System
Lean how CAs maintain and issue digital certificates, RAs handle the verification process, and more.

172932

Other products in the same category (16)