Tags
Language
Tags
November 2025
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Bulletproofing TCP/IP-based Windows NT/2000 Networks

    Posted By: insetes
    Bulletproofing TCP/IP-based Windows NT/2000 Networks

    Bulletproofing TCP/IP-based Windows NT/2000 Networks By Gilbert Held(auth.)
    2001 | 304 Pages | ISBN: 0471495077 | PDF | 3 MB


    Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks. - Covers how TCP/IP operates and how TCP/IP attacks occur. - Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000- host on such networks against different attack methods. - Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention. - Uses practical real-world examples of methods used to block potential attacks. Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.Content: Chapter 1 Introduction (pages 1–18): Chapter 2 The TCP/IP Protocol Suite (pages 19–84): Chapter 3 Network Attack Methods (pages 85–104): Chapter 4 The Security Role of the Router (pages 105–153): Chapter 5 The Role of the Firewall (pages 155–181): Chapter 6 The Role of the Virus Scanner and Encryption (pages 183–204): Chapter 7 Host Attack Methods (pages 205–224): Chapter 8 Working with Windows (pages 225–262): Chapter 9 The Role of the Scanner (pages 263–285):

    Your Decision to Buying/Renewing Premium From My Blog Links Empowers Our Mission