« Home | VTC - Web Design Fundamentals » | Before & After Magazine BA0635 - Make a Theme » | Total Recorder PRO and Developer Edition v5.3 » | Internet Download Manager 5.02 Build 11 » | Proxifier v2.0 » | Stylus Studio 2006 XML EE v7.2.591a » | Placebo - Meds [2006] » | Pink - Stupid Girl (uncensored) » | Roxio Easy Media Creator v8.05 Suite - Full » | Xchat v2.63 ».

Sunday, April 16, 2006.

Hardening Network Infrastructure


ISBN: 0072255021
Author: Wes Noonan
Publisher: McGraw-Hill Osborne


This book is invaluable to anyone facing the challenges of security in a business environment. --Paul D. Robertson, Moderator of Firewall-Wizards and Director of Risk Assessment, TruSecure Corporation A Note From Series Editor: I first got to know Wesley Noonan through a common newsgroup. His insightful and technical comments stuck with me, and I finally met him at a conference several years later. Wes has the gift to present network security in a concise, well-reasoned way--easy for everyone to understand regardless of their security or networking knowledge. His writing style reflects his congenial presentation manner and his knowledge, and his eagerness to share his expertise is exceptional.

Wes's guide to hardening your network infrastructure provides the step-by-step how-to approach that you need to build, deploy, and maintain a security defense. I've read every word; you will not be disappointed. --Roberta Bragg Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your perimeter and internal network infrastructure, focusing on firewalls, IDS/IPS, network content filtering, wireless LAN connections, routers, and switches Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed at Hardening Your Network Infrastructure--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program About the author: Wesley J. Noonan, MCSE, CCNA, CCDA, NNCSS, Security+, is a Senior Network Consultant for Collective Technologies, LLC, a company specializing in storage, server and network design, architecture, implementation, and security. Series Editor: Roberta Bragg, CISSP, MCSE: Security, Security+, is the Security Advisor columnist for MCP magazine and a Security Expert for searchWin2000.com. She also writes for the Security Watch newsletter and is the author of several computer books.


Links to this post

Create a Link

About me

Search this site

Google
Web free-archives.blogspot.com

Request / Comment

Powered by Blogger
and Blogger Templates


free-archives stats



Site Meter