作者:Michael Gregg
出版日期:April 28, 2008
出版社:Wiley Publishing
页数:428
ISBN:ISBN-10: 0470179864 ISBN-13: 978-0470179864
文件格式:PDF
Product Description
If your job is to design or implement IT security solutions or if yourestudying for any security certification, this is the how-to guide youvebeen looking for. Heres how to assess your needs, gather the tools, andcreate a controlled environment in which you can experiment, test, anddevelop the solutions that work. With liberal examples from real-worldscenarios, it tells you exactly how to implement a strategy to secureyour systems now and in the future.
From the Back Cover
Many books tell you what to do. This one tells you how.
If your job is to design or implement IT security solutions, or ifyou’re studying for any security certification, this is the how-toguide you’ve been looking for. Here’s how to assess your needs, gatherthe tools, and create a controlled environment in which you canexperiment, test, and develop the solutions that work. With liberalexamples from real-world scenarios, it tells you exactly how toimplement a strategy to secure your systems now and in the future.
Collect the necessary hardware and software and assemble your own network labConfigure a bootable Linux CDExplore various methods for gathering information about existing securityIdentify automated attack and penetration toolsUnderstand cryptographic systems and encryption and authentication attacksLearn to find, identify, and defeat malwareAddress the special protection needs of wireless systemsUse Snort® to build an IDS that will help to detect and identify attacks in real time