Get Free Shipping on orders over $79
Network Security : A Practical Approach - Jan L. Harrington

Network Security

A Practical Approach

By: Jan L. Harrington

Paperback | 1 February 2005

Sorry, we are not able to source the book you are looking for right now.

We did a search for other books with a similar title, however there were no matches. You can try selecting from a similar category, click on the author's name, or use the search box above to find your book.

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.

You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You'll learn to do just that with this book's assessments of the risks, rewards, and trade-offs related implementing security measures.

  • Helps you see through a hacker's eyes so you can make your network more secure.
  • Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.
  • Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.
  • Covers techniques for enhancing the physical security of your systems and network.
  • Explains how hackers use information-gathering to find and exploit security flaws.
  • Examines the most effective ways to prevent hackers from gaining root access to a server.
  • Addresses Denial of Service attacks, "malware," and spoofing.
  • Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

More in Computer Networking & Communications

Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Troubleshooting PCs For Dummies : For Dummies (Computer/Tech) - Dan Gookin
Essentials of Computer Networking - Paxton Byrne
Cyberethics - Richard A. Spinello

Paperback

$119.75

Learning Git : A Hands-On and Visual Guide to the Basics of Git - Anna Skoulikari
Linux All-In-One For Dummies : For Dummies (Computer/Tech) - Richard Blum
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
From Chaos to Clarity : How Data Visualization can Save the World - James Eagle
Microsoft Teams For Dummies : For Dummies (Computer/Tech) - Rosemarie Withee
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF