HARDENING Network Security

Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete d...

Full description

Saved in:
Bibliographic Details
Main Authors: Mallery, John (Author), Zann, Jason (Author), Kelly, Patrick (Author), Noonan, Wesley (Author), Seagren, Eric (Author), love, Paul (Author), Kraft, Rob (Author), O'Neill, Mark (Author)
Format: Book
Language:English
Published: New York McGraw Hill 2005
©2005
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-330777
005 202091211651
008 201012 2005 -US a|| |01 |#eng#D
020 # # |a 0072257032  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .H37 2005 
100 1 # |a Mallery, John  |e author 
245 1 1 |a HARDENING Network Security  |c John Mallery, Jason Zan, Patrick Kelly, Wesley Noonan, Eric Seagren..and 3 others 
264 # 1 |a New York  |b McGraw Hill  |c 2005 
264 # 1 |c ©2005 
300 # # |a xxx, 593 pages  |b illustrations  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
520 # # |a Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program ( 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Zann, Jason  |e author 
700 1 # |a Kelly, Patrick  |e author 
700 1 # |a Noonan, Wesley  |e author 
700 1 # |a Seagren, Eric  |e author 
700 1 # |a love, Paul  |e author 
700 1 # |a Kraft, Rob  |e author 
700 1 # |a O'Neill, Mark  |e author 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=330777 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||