首页
社区
课程
招聘
[转帖]Internet Lockdown: Internet Security Administrator's Handbook
发表于: 2010-9-20 13:15 1055

[转帖]Internet Lockdown: Internet Security Administrator's Handbook

2010-9-20 13:15
1055
Internet Lockdown: Internet Security Administrator's Handbook



Tim Crothers, "Internet Lockdown: Internet Security Administrator's Handbook"
Wiley | 2001 | ISBN: 0764548611 | 384 pages | CHM | 7,9 MB

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand. This book takes the theory behind security and provides real-world implementation examples and techniques.


Amazon.com Review:

Because it suffers from too many of several good things--namely, screen shots, command-line listings, and code listings--Internet Lockdown isn't as good as it might have been. Such raw material is valuable in a security book, but only when the author takes time to comment meaningfully upon it and explain how aspects of the examples can be made to apply to other systems and other problems. Too much of this book seems to consist of documents that were just poured into place. Some of these--like the corporate security policy template--would be more useful if digital copies were available somewhere (this book has no companion CD-ROM or Web site). Others, like some massive listings that go on at length, just aren't valuable without careful commentary that explains what's happening. Screen shots are not only numerous, but overly large.

There's no doubt about Tim Crothers's competence as a security expert--he works as a security consultant and some of the stories he tells in these pages obviously come from his work experience. Lots of readers will learn from his accounts of exploits; they're the strong point of this book. He's also pretty good about defining terms and clarifying differences (like those between signature-based intrusion-detection systems and analysis-based intrusion detection systems). Still, other security books (like Hacking Exposed and Network Intrusion Detection) are better choices. --David Wall

Topics covered: Ways to secure your computer network against intrusion by worms, viruses, and human intruders. Security policies and procedures get attention, as do ways of implementing intrusion detection, authentication, and software security.


http://depositfiles.com/files/50vseg6ex
http://www.filesonic.com/file/20316301/0764548611InternetLockdown.rar


Программное обеспечение выпуска и Windows Crack Обучение
Нам-Dabei Guanyin Бодхисаттва Нам без митабха

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

上传的附件:
收藏
免费 1
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//