買這商品的人也買了...
-
$1,890$1,796 -
$2,176Refactoring: Improving the Design of Existing Code (Hardcover)
-
$2,240$2,128 -
$1,110$1,055 -
$1,890$1,796 -
$299Internet Open Trading Protocol
-
$2,520$2,394 -
$1,270$1,207 -
$199Hacker Attack
-
$2,520$2,394 -
$299Certified Lotus Professional: Application Development Study Guide (Hardcover)
-
$1,100$1,045 -
$2,170$2,062 -
$1,550$1,473 -
$399$339 -
$399$339 -
$1,860$1,767 -
$2,210$2,100 -
$1,710$1,625 -
$1,300$1,274 -
$1,890$1,796 -
$1,260CCNA Certification Library (CCNA Self-Study, exam #640-801), 6/e
-
$399CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801) (Hardcover)
-
$450$356 -
$1,890$1,796
相關主題
商品描述
Security Complete is a one-of-a-kind book--valuable both for its broad content and its low price. The book contains the essentials you need to know about securing your environment--from protecting yourself against Trojan horses to auditing your Linux system.
With Security Complete, you'll learn all about security basics
including how much security you need, how to protect yourself at home, and how
to ward off Internet pirates and hackers. The book also takes you into various
operating systems including Windows 2000, Linux, and NetWare, showing you the
tips and tricks to securing each one. Get up to speed on firewalls, remote
access solutions, and Virtual Private Networks, and soon you'll be able to
ensure the security of your home and business network.
Security
Complete introduces you to the work of some of Sybex's finest authors, so
you'll know where to go to learn even more about protecting your valuable
assets.
CONTENTS
Introduction
Part I: Network Security Fundamentals
- Chapter 1: Why Secure Your Network?
Chapter 2: How Much Security Do You Need?
Chapter 3: Understanding How Network Systems Communicate
Chapter 4: Authentication and Encryption
Part II: Computer Crime: Hacking, Cracking, Trojan Horses, Digital Piracy, and Things That Go Bump in the Night
- Chapter 5: Hackers, Crackers, and Whackers
Chapter 6: Prevention, Detection, and Elimination
Chapter 7: Digital Piracy 101
Chapter 8: Crime and Punishment: Piracy and the Law
Chapter 9: The Pirate's Basic Tools
Part III: Operating Systems and Servers: Windows 2000, Linux, and Netware
- Chapter 10: Windows 2000 Security
Chapter 11: Securing Your NetWare 5.1 Network
Chapter 12: Linux System Installation and Setup
Chapter 13: Linux System Monitoring and Auditing
Chapter 14: Linux DNS Server Administration & Security
Chapter 15: Samba Security Considerations
Part IV: Firewalls
- Chapter 16: Understanding Firewalls
Chapter 17: Packet Filtering
Chapter 18: Network Address Translation
Chapter 19: Windows NT/2000 Firewalls
Chapter 20: Unix Firewalls
Chapter 21: Linux Network-Layer Firewalls
Part V: Remote Access and Virtual Private Networks
- Chapter 22: Virtual Private Networking with Linux
Chapter 23: Windows 2000 Remote Access
Chapter 24: Other Virtual Private Networking Options
Chapter 25: Setting Up Windows RAS Clients
Part VI: Security-Related MCSE Highlights
- Chapter 26: Windows 2000 MCSE: the Impact of Security Design
Chapter 27: Windows 2000 MCSE: Security Baselines
Chapter 28: Windows 2000 MCSE: Designing the Security Solution
Index