Inside Network Perimeter Security
来源:互联网 发布:枪毙 知乎 编辑:程序博客网 时间:2024/05/18 02:02
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
http://rapidshare.com/files/52160648/0672327376.zip
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
http://rapidshare.com/files/52160648/0672327376.zip
- Inside Network Perimeter Security
- Network Security
- network security
- network security
- [Network]Network Security
- Open Source for Perimeter Security @ JDJ
- [Cloud Computing]Mechanisms: Logical Network Perimeter
- Network Security Hacks
- Network Security Technologies
- Network security bible
- Linux Network Security
- Home Network Security Simplified
- Network Security Hacks [ILLUSTRATED]
- Network Security Illustrated
- Network Security JumpStart
- Mastering Network Security
- Practical Network Security Monitoring
- Network Security Tools
- Networks of Innovation : Change and Meaning in the Age of the Internet
- Perl & LWP
- The Semantic Web : A Guide to the Future of XML, Web Services, and Knowledge Management
- Javascript 获取链接(url)参数的方法
- Six Sigma and Beyond: Statistical Process Control, Volume IV
- Inside Network Perimeter Security
- Wireless Technician's Handbook
- AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis
- location对象有以下几个属性:
- A Practical Guide to Managing Information Security
- window.showModalDialog使用手册
- Core J2EE patterns: best practices and design strategies
- Frame-Relay基础及配置学习笔记
- Tcl/Tk : A Developer's Guide