The Weakest Security Link Series
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understanding of networking technologies can benefit from this book. Unlike other network security books written with in-depth coverage of things you don t need, this book takes a different spin on security: The focus of this book is to explore and identify the weak security links in your entire network. We will achieve this by addressing the basic and most overlooked security steps in your network. When you purchase this book, you will receive a free online security support incident ($125 value) to help you strengthen your network security. Your network security is only as strong as its weakest security link.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Cisco Router PIX Security
Windows 2000 Server Security
IIS Web Server Media Stream Security
SQL 2000 Server Security
Exchange 2000 Server Security
Profile of Hackers Stalkers
InfraSecurity Configuration Form
Appendix A Security QA
Appendix B Sample Configurations
About the Author
Access Control List Active Directory administrators application attacks Audit authentication Available Hotfix Available Patch Available Version Avoid backup border router browser cache change the default Cisco Cisco PIX client company’s configuration connections database server default port Delete desktop Directory Disable e-mail Enable encrypt Exchange server fixup protocol folder front-end hackers host Hotfix Hotfix Level IIS server inbound installed Integrated Windows Authentication interface Internal IP Internet IP address IP filter IPSec ISAPI layer log files login mail server Manager Microsoft mode monitor network security O/S Version OSI Model packet password Patch Level perimeter permissions POP3 Remote restrict right-click router router and firewall running S/MIME security hotfixes Security Level Security Recommendations Security Tips Server Security SMTP spoofing SQL server SSeeccuurriittyy stalkers sure syslog TCP/IP timeout tion updates URLScan users Vendor/Model Vulnerabilities web server