Network Security JumpStart: Computer and Network Security Basics - Tapa blanda

Strebe, Matthew

 
9780782141207: Network Security JumpStart: Computer and Network Security Basics

Sinopsis

Analysts agree that computer and network security is one sector in the IT industry that's likely to grow in coming years. Corporate demand for individuals skilled in security technologies far outpaces the existing pool of qualified candidates. In response to this need, certification vendors such as Cisco, Check Point, and CompTIA have developed a number of certifications that validate expertise in a specific segment of the security market. But before embarking on a comprehensive security certification study program, aspiring IT professionals need a solid foundation in network security fundamentals, and that's exactly what this book provides.

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca del autor

Matthew Strebe is the best--selling author of Windows 2000: 24seven and From Serf to Surfer: Becoming a Network Consultant. Owner of Netropolis, a network integration firm specializing in high--speed networking and Windows NT/2000, Strebe's long history of networking includes installing the US Navy's first fiber--optic local area network on a ship.

De la contraportada

Build Your Network Security Career on a Solid Foundation

Whether you re setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes:

  • Understanding security principles
  • Understanding hacking
  • Using encryption and authentication
  • Managing security
  • Securing Internet connections
  • Using Virtual Private Networks
  • Securing remote and home users
  • Implementing virus protection
  • Creating fault tolerance
  • Securing Windows servers
  • Securing UNIX servers
  • Securing public web servers
  • Securing public e-mail servers
  • Detecting intrusion

"Sobre este título" puede pertenecer a otra edición de este libro.