How to Cheat at Securing Your Network
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction.
The latest addition to the best selling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.
* A concise information source - perfect for busy System Administrators with little spare time
* Details what to do when disaster strikes your network
* Covers the most likely threats to small to medium sized networks
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control ActiveX controls administrators algorithms allow applet application auditing authentication browser buffer overflow cable certificate cleartext client communication configured connection cookies create cryptography database decrypt default detect devices directory services disable e-mail server encryption example exploited Figure files filter firewall function hacker hash host IDSes implemented installed interface internal network Internet IP address IPSec L2TP layer LDAP MAC address machine malicious method Microsoft monitor NetStumbler Nmap packet password Phishing plaintext port private key problems programs protect Protocol public key remote access require routers scan scripts session signatures specific spoofing SSID standard stored switch Telnet traffic trust unauthorized updates user’s username users valid vendors virus vulnerabilities wardriving Web server WEP keys Windows wireless network Wireshark workstation