LATEST DISCOUNTS & SALES: PROMOTIONS

Close Notification

Your cart does not contain any items

Network Perimeter Security

Building Defense In-Depth

Cliff Riggs

$252

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
Auerbach
27 October 2003
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.

Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing

process. Through the concepts and case studies presented

in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without

having to pursue attain a security certification.

By:  
Imprint:   Auerbach
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm,  Spine: 26mm
Weight:   752g
ISBN:   9780849316289
ISBN 10:   0849316286
Pages:   420
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Preface. Managing Network Security. The Network Stack and Security. Cryptography and VPN Terminology. Application Security Needs. Access Control. The Public Key Infrastructure. Firewalls. Intrusion Detection Systems. Virtual Private Networks. Wireless Network Security. Network Penetration Testing. Incident Response. Disaster Recovery and Continuity Planning. Acceptable Use Policies. The Final Word.

Riggs, Cliff

See Also