Autor: Michael Gregg
Wydawca: Wiley
Dostępność: 3-6 tygodni
Cena: 231,00 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780470179864 |
ISBN10: |
0470179864 |
Autor: |
Michael Gregg |
Oprawa: |
Paperback |
Rok Wydania: |
2008-04-25 |
Ilość stron: |
456 |
Wymiary: |
235x187 |
Tematy: |
UT |
Many books tell you what to do. This one tells you how.
If your job is to design or implement IT security solutions, or if you′re studying for any security certification, this is the how–to guide you′ve been looking for. Here′s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real–world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
Collect the necessary hardware and software and assemble your own network lab
Configure a bootable Linux CD
Explore various methods for gathering information about existing security
Identify automated attack and penetration tools
Understand cryptographic systems and encryption and authentication attacks
Learn to find, identify, and defeat malware
Address the special protection needs of wireless systems
Use Snort® to build an IDS that will help to detect and identify attacks in real time
DVD includes tools for actually building and implementing security solutions
Open source tools
Demo software
A bootable version of Linux
Spis treści:
Acknowledgments.
Introduction.
Chapter 1 Hardware and Gear.
Chapter 2 Building a Software Test Platform.
Chapter 3 Passive Information Gathering.
Chapter 4 Detecting Live Systems.
Chapter 5 Enumerating Systems.
Chapter 6 Automated Attack and Penetration Tools.
Chapter 7 Understanding Cryptographic Systems.
Chapter 8 Defeating Malware.
Chapter 9 Securing Wireless Systems.
Chapter 10 Intrusion Detection.
Chapter 11 Forensic Detection.
Appendix A About the DVD.
Index.
Nota biograficzna:
Michael Gregg, CISSP, CISA, MCSE, holds a total of 19 professional certifications and is a highly respecte
d security consultant. President of Security Solutions, Inc., he is also an expert for three TechTarget.com web sites. Michael has authored or coauthored several books, including Security+ Street Smarts, also published by Wiley.
Okładka tylna:
Many books tell you what to do. This one tells you how.
If your job is to design or implement IT security solutions, or if you′re studying for any security certification, this is the how–to guide you′ve been looking for. Here′s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real–world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
Collect the necessary hardware and software and assemble your own network lab
Configure a bootable Linux CD
Explore various methods for gathering information about existing security
Identify automated attack and penetration tools
Understand cryptographic systems and encryption and authentication attacks
Learn to find, identify, and defeat malware
Address the special protection needs of wireless systems
Use Snort® to build an IDS that will help to detect and identify attacks in real time
DVD includes tools for actually building and implementing security solutions
Open source tools
Demo software
A bootable version of Linux
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy