How to cheat at securing your network:
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, MA
Syngress
2007
|
Schriftenreihe: | "How to cheat--"
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492317/?ar |
Zusammenfassung: | Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit Printbegrænsninger: Der kan printes kapitelvis. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (xix, 409 Seiten) illustrations |
ISBN: | 9780080558646 008055864X 9781597492317 1597492310 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051693267 | ||
003 | DE-627-1 | ||
005 | 20240228114239.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780080558646 |c electronic bk. |9 978-0-08-055864-6 | ||
020 | |a 008055864X |c electronic bk. |9 0-08-055864-X | ||
020 | |a 9781597492317 |9 978-1-59749-231-7 | ||
020 | |a 1597492310 |9 1-59749-231-0 | ||
035 | |a (DE-627-1)051693267 | ||
035 | |a (DE-599)KEP051693267 | ||
035 | |a (ORHE)9781597492317 | ||
035 | |a (DE-627-1)051693267 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a How to cheat at securing your network |c [Ido Dubrawksy, technical editor] |
246 | 3 | 3 | |a Securing your network |
264 | 1 | |a Burlington, MA |b Syngress |c 2007 | |
300 | |a 1 Online-Ressource (xix, 409 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a "How to cheat--" | |
500 | |a Print version record | ||
520 | |a Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit | ||
520 | |a Printbegrænsninger: Der kan printes kapitelvis. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Dubrawsky, Ido |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597492317 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492317 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492317/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051693267 |
---|---|
_version_ | 1821494842697449472 |
adam_text | |
any_adam_object | |
author2 | Dubrawsky, Ido |
author2_role | ctb |
author2_variant | i d id |
author_facet | Dubrawsky, Ido |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051693267 (DE-599)KEP051693267 (ORHE)9781597492317 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04019cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-051693267</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114239.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558646</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055864-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008055864X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055864-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492317</subfield><subfield code="9">978-1-59749-231-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492310</subfield><subfield code="9">1-59749-231-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051693267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051693267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051693267</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at securing your network</subfield><subfield code="c">[Ido Dubrawksy, technical editor]</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Securing your network</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 409 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">"How to cheat--"</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Printbegrænsninger: Der kan printes kapitelvis.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dubrawsky, Ido</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597492317</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492317</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492317/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051693267 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:48Z |
institution | BVB |
isbn | 9780080558646 008055864X 9781597492317 1597492310 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xix, 409 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
series2 | "How to cheat--" |
spelling | How to cheat at securing your network [Ido Dubrawksy, technical editor] Securing your network Burlington, MA Syngress 2007 1 Online-Ressource (xix, 409 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier "How to cheat--" Print version record Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit Printbegrænsninger: Der kan printes kapitelvis. Computer networks Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Dubrawsky, Ido MitwirkendeR ctb 9781597492317 Erscheint auch als Druck-Ausgabe 9781597492317 |
spellingShingle | How to cheat at securing your network Computer networks Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | How to cheat at securing your network |
title_alt | Securing your network |
title_auth | How to cheat at securing your network |
title_exact_search | How to cheat at securing your network |
title_full | How to cheat at securing your network [Ido Dubrawksy, technical editor] |
title_fullStr | How to cheat at securing your network [Ido Dubrawksy, technical editor] |
title_full_unstemmed | How to cheat at securing your network [Ido Dubrawksy, technical editor] |
title_short | How to cheat at securing your network |
title_sort | how to cheat at securing your network |
topic | Computer networks Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT dubrawskyido howtocheatatsecuringyournetwork AT dubrawskyido securingyournetwork |