LEADER 04317nam a2200433Ii 4500 001 991003243739707536 006 m d 007 cr cn||||||||| 008 070802s2005 ne a sb 001 0 eng d 020 $a9780123116338 020 $a0123116333 035 $ab13654408-39ule_inst 037 $a103629:103649$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aHarrington, Jan L.$0627492 245 10$aNetwork security$h[electronic resource] :$ba practical approach /$cJan L. Harrington. 260 $aAmsterdam ;$aBoston :$bElsevier :$bMorgan Kaufmann Publishers,$cc2005. 300 $axv, 365 p. :$bill. ;$c24 cm. 504 $aIncludes bibliographical references (p. 344-345) and index. 505 0 $aChapter 1: In the Beginning -- Chapter 2: Basic Security Architecture -- Chapter 3: Physical Security -- Chapter 4: Information Gathering -- Chapter 5: Gaining and Keeping Root Access -- Chapter 6: Spoofing -- Chapter 7: Denial of Service Attacks -- Chapter 8: Malware -- Chapter 9: User and Password Security -- Chapter 10: Remote Access -- Chapter 11: Wireless Security -- Chapter 12: Encryption -- Appendix A: The TCP/IP Protocol Stack -- Appendix B: TCP and UDP Ports -- Appendix C: Security Update Sites -- Glossary -- Index. 520 $aNetwork Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on July 25, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 650 17$aComputernetwerken.$2gtt 650 17$aComputerbeveiliging.$2gtt 650 6$aRéseaux d'ordinateurs$xSécurité$xMesures. 655 7$aElectronic books.$2local 776 1 $cOriginal$z0123116333$z9780123116338$w(DLC) 2005040077$w(OCoLC)58546394 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9780123116338$zAn electronic book accessible through the World Wide Web; click for information 856 42$zPublisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy0623/2005040077-d.html 856 41$zTable of contents only$uhttp://catdir.loc.gov/catdir/enhancements/fy0623/2005040077-t.html 907 $a.b13654408$b24-02-22$c24-01-08 912 $a991003243739707536 994 $aC0$bTEF 996 $aNetwork security$91212757 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gne $h0$i0