HARDENING Network Security
Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete d...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Format: | Book |
Language: | English |
Published: |
New York
McGraw Hill
2005
©2005 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-330777 | ||
005 | 202091211651 | ||
008 | 201012 2005 -US a|| |01 |#eng#D | ||
020 | # | # | |a 0072257032 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .H37 2005 |
100 | 1 | # | |a Mallery, John |e author |
245 | 1 | 1 | |a HARDENING Network Security |c John Mallery, Jason Zan, Patrick Kelly, Wesley Noonan, Eric Seagren..and 3 others |
264 | # | 1 | |a New York |b McGraw Hill |c 2005 |
264 | # | 1 | |c ©2005 |
300 | # | # | |a xxx, 593 pages |b illustrations |c 23 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | # | # | |a Includes index |
520 | # | # | |a Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program ( |
650 | # | 0 | |a Computer networks |x Security measures |
700 | 1 | # | |a Zann, Jason |e author |
700 | 1 | # | |a Kelly, Patrick |e author |
700 | 1 | # | |a Noonan, Wesley |e author |
700 | 1 | # | |a Seagren, Eric |e author |
700 | 1 | # | |a love, Paul |e author |
700 | 1 | # | |a Kraft, Rob |e author |
700 | 1 | # | |a O'Neill, Mark |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=330777 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2|| |