|
作者:Michael Gregg
出版日期:April 28, 2008
出版社:Wiley Publishing
页数:428
ISBN:ISBN-10: 0470179864 ISBN-13: 978-0470179864
文件格式:PDF
Product Description
If your job is to design or implement IT security solutions or if yourestudying for any security certification, this is the how-to guide youvebeen looking for. Heres how to assess your needs, gather the tools, andcreate a controlled environment in which you can experiment, test, anddevelop the solutions that work. With liberal examples from real-worldscenarios, it tells you exactly how to implement a strategy to secureyour systems now and in the future.
From the Back Cover
Many books tell you what to do. This one tells you how.
If your job is to design or implement IT security solutions, or ifyou’re studying for any security certification, this is the how-toguide you’ve been looking for. Here’s how to assess your needs, gatherthe tools, and create a controlled environment in which you canexperiment, test, and develop the solutions that work. With liberalexamples from real-world scenarios, it tells you exactly how toimplement a strategy to secure your systems now and in the future.
- Collect the necessary hardware and software and assemble your own network lab
- Configure a bootable Linux CD
- Explore various methods for gathering information about existing security
- Identify automated attack and penetration tools
- Understand cryptographic systems and encryption and authentication attacks
- Learn to find, identify, and defeat malware
- Address the special protection needs of wireless systems
- Use Snort® to build an IDS that will help to detect and identify attacks in real time
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册
×
|