ISBN 9788176567893,Security Complete

Security Complete




BPB Publications



BPB Publications

Publication Year 2003

ISBN 9788176567893

ISBN-10 8176567892


Number of Pages 961 Pages
Language (English)

Computer And Internet

This second edition of Security Complete is a one-of-a-kind book--valuable both for its broad content and its low price. The book contains the essentials you need to know about securing your environment--from evaluating how much security you really need to auditing a Linux network system. The book also takes you into various operating systems including Windows 2000, Windows XP, Linux, and NetWare, showing you the tips and tricks to securing each one. Get up to speed on encryption, firewalls, and the industry's top security certifications, and soon you'll be able to ensure the security of your home and business networks. Table of Contents Introduction. Part I: Network Security Fundamentals. Chapter 1: A Systems Approach to Information Networks. Chapter 2: Security as a Process. Chapter 3: A Bird?-Eye View of Topology Security. Chapter 4: Authentication and Encryption. Part II: Operating Systems and Servers. Chapter 5: Windows 2000 Security. Chapter 6: Living with Windows XP Professional Strict Security. Chapter 7: Securing Your NetWare 6 Network. Chapter 8: Linux System Installationand Setup. Chapter 9: Linux System Monitoring and Auditing. Chapter 10: Samba Security Considerations. Part III: Firewalls. Chapter 11: Understanding Firewalls. Chapter 12: Packet Filtering. Chapter 13: Network Address Translation. Chapter 14: Windows Firewalls. Chapter 15: Unix Firewalls. Chapter 16: Linux Network-Layer Firewalls. Part IV: Cisco Security Specialist (CSS1)Highlights. Chapter 17: PIX Firewall Basics. Chapter 18: PIX Firewall Configuration. Chapter 19: Introduction to Virtual Private Networks. Chapter 20: Introduction to Cisco VPN Devices. Chapter 21: Installing Cisco Secure IDS Sensors and IDSMs. Chapter 22: Sensor Configuration. Part V: Security-Related MCSE Highlights. Chapter 23: Evaluating the Impact of the Security Design onthe Technical Environment. Chapter 24: Designing Security Baselines. Chapter 25: Designing the Security Solution. Glossary of Networking Terms. Index.