Find and eliminate weaknesses in your existing security system. If you are using the Internet to conduct professional or personal business, you want to know your Internet connection is secure. Internet Security Professional Reference, Second Edition gives you all the information and tools you need to keep the hackers out and the mission-critical information in. Internet Security Professional Reference, Second Edition takes you through planning, implementing, and administering a secure Internet connection--from understanding ...
Read More
Find and eliminate weaknesses in your existing security system. If you are using the Internet to conduct professional or personal business, you want to know your Internet connection is secure. Internet Security Professional Reference, Second Edition gives you all the information and tools you need to keep the hackers out and the mission-critical information in. Internet Security Professional Reference, Second Edition takes you through planning, implementing, and administering a secure Internet connection--from understanding UUCP and auditing to encryption and firewalls to understanding viruses--this book has everything you need. A comprehensive resource for security and network professionals alike, Internet Security Professional Reference, Second Edition will show you how to use and implement the latest technologies in the most secure fashion, including Java, CGI, and Windows NT. So, whether you re planning to implement a new Internet security system or optimize an existing one, Internet Security Professional Reference, Second Edition has all the answers you need! This is the only single source reference that detials how Internet and network security is implemented and explains the techniques you can use to keep it from being violated: -Create and implement a proactive security system -Discover how intruders bypass security checkpoints, and keep them out -Prevent spoofing and sniffing by finding and fixing flaws in your existing setup -Use encryption techniques to secure your message, regardless of the gateway -Pick the best firewall to purchase for your company with helpful tips from the experts -Keep hackers and thieves at bay by byilding your own super-effective firewall -Stop avirus from crashing your system -Maximize SATAN and Kerberos to secure your gateway -Create daemons to customize your security systemShows how security traditionally is implemented, how hackers bypass it, and how to prevent future break-insProvides proactive computer security solutions for networksPoints out inconsistencies, weaknesses, and breaches in existing security implementations
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Good condition. 2nd edition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. NOT AVAILABLE FOR SHIPMENT OUTSIDE OF THE UNITED STATES.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
New. Book is in excellent condition. 100% Satisfaction Guaranteed. Orders received before 3PM PT typically ship same day. All profits support the non-profit community.