Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Internet security professional reference

    Posted By: insetes
    Internet security professional reference

    Internet security professional reference By Cisco Systems Inc., Tim Petru, Derek Atkins, Derek Atkins
    1997 | 920 Pages | ISBN: 156205760X | PDF | 7 MB


    If you are using the Internet to conduct professional or personal business, you want to know your Internet connection is secure. This book gives you all the information and tools you need to keep the hackers out and the mission-critical information in. It takes you through planning, implementing, and administering a secure Internet connection--from understanding UUCP and auditing to encryption and firewalls to understanding viruses. A comprehensive resource for security and network professionals alike, this book will show you how to use and implement the latest technologies in the most secure fashion, including Java, CGI, and Windows NT.Amazon.com Review This is a big book--more than 850 pages. And the type is small, too. It has precisely what's needed to pack a comprehensive resource on Internet security into a single volume. The authors don't waste space on philosophizing or lecturing about security--they simply lay out what a site manager needs to know, beginning with the basics of TCP/IP. The book presents a five-part approach. Part one deals with security management, including TCP/IP, daemons, UUCP, and audit trails. Part two switches perspectives to that of the intruder, showing ways of gaining illicit accesses and how attempts to do so can be thwarted. Part three examines the challenges of creating secure channels for messaging. Part four shows how to deal with security concerns raised by Windows NT, Java, and various viruses. Part five contains the appendices, offering an array of security references and resources where site managers can find further and updated information. While the need to cram such a vast storehouse of information into the books rarely allows for a relaxed style of exposition, the authors have done a fine job of keeping explanations clear and useful to even novice site managers.