C++ CSS HTML Java JavaScript MySQL Oracle PERL PHP SQL Unix VBScript XHTML XML Сети

Безопасность сетей

 
Поиск:  

Категория: - Компьютерные сети

Формат посмотра: Полный многострочный, Полный в две строчки, Полный в одну строчку, Полный без аннотации, Средний, Наименование-Цена-Автор, Наименование-Цена

Сортировка: Наименование, Цена, Автор, Год, Производитель


Интернет изнутри. Экосистема глобальной сетиИнтернет изнутри. Экосистема глобальной сети

Автор: Андрей Робачевский

Цитата Каждый день приносит нам сотни, если не тысячи новых "apps". Спускаясь ниже, к сетевому уровню, мы обнаружим, что здесь развитие происходит существенно медленнее. Андрей Робачевский О чем книга Книга рассказывает об архитектуре и технологиях Интернета, фокусируясь на его основных компонентах: глобальной адресации и протоколе IP, системе доменных имен и глобальной межсетевой маршрутизации. Рассматриваются аспекты и принципы работы Всемирной сети, вопросы стандартизации, развития и безопасности основных систем Интернета. Обсуждается архитектурная эволюция Интернета в целом, а также связанные с ней вопросы внедрения новых протоколов и технологий. Особое внимание уделено экосистеме Интернета, ее истории, а также основным организациям, включенным в систему принятия решений в Интернете. Ключевые темы За облачным фасадом приложений и услуг: в чем сложность простых вещей? Современная интернет-революция. Вы не...

Цена: 629 руб.
Страницы: 224
Год: 2017
Производитель: Альпина Паблишер
ISBN: 978-5-9614-4803-0, 978-5-9614-5882-4

Купить


Компьютерные сети. Настольная книга системного администратораКомпьютерные сети. Настольная книга системного администратора

Автор: Джеймс Куроуз, Кит Росс

Всемирно известная книга, которая уже более 15 лет возглавляет рейтинги продаж по всему миру и пережила 6 переизданий. Несмотря на это, она не потеряла своей актуальности и продолжает оставаться незаменимым источником знаний для тех, чья работа связана с администрированием и защитой компьютерных сетей. Это прекрасное учебное пособие для студентов технических вузов. Что внутри: как функционируют интернет и локальные сети? как работают сетевые протоколы и службы? алгоритмы маршрутизации. сетевая безопасность и основы криптографии. сетевое администрирование.

Серия: Мировой компьютерный бестселлер

Цена: 1079 руб.
Страницы: 912
Год: 2016
Производитель: Эксмо
ISBN: 978-5-699-94358-6, 0132856204

Купить


Утечка и защита информации в телефонных каналахУтечка и защита информации в телефонных каналах

Автор: А. В. Петраков, В. С. Лагутин, А. В. Косариков

В книге рассмотрены различные варианты утечки аудиовидеоинформации из телефонной сети и возможные методы и средства ее защиты. Приведены сведения о широкой номенклатуре средств как съема, так и защиты информации. Телефонный канал (3,1 кГц; 64 кбит/с) - основной (стандартный) канал доставки аудиовидеоинформации потребителю. Широкополосный (высокоскоростной) канал создается объединением телефонных каналов, узкополосные (низкоскоростные) каналы используют телефонный канал (по полосе или по скорости передачи) частично. Для научных работников и инженеров, чья деятельность связана с необходимостью охраны информации. Книга может служить пособием по дисциплинам "Защита информации". "Основы защиты информации", "Техническая защита информации" для университетов, колледжей и институтов повышения квалификации.

Цена: 659 руб.
Страницы: 352
Год: 2011
Производитель: РадиоСофт
ISBN: 978-5-93037-229-8

Купить


Cisco Security Professionals Guide to Secure Intrusion Detection SystemsCisco Security Professional's Guide to Secure Intrusion Detection Systems

Автор: Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky

Your Complete Guide to Cisco Enterprise IDS Management This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional?s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100). Review Intrusion Detection Systems Find coverage of the basic threats and attack types, as well as an overview of the various types of intrusion detection. Learn About Cisco Intrusion Detection Explore the nuts and bolts behind a Cisco-based IDS system, covering both Cisco?s "Active Defense" and "Defense in Depth" methodologies. Install Sensor Appliances Install the Cisco IDS appliances on your network and learn about password recovery. Install the Cisco Secure Policy Manager (CSPM) Review the Cisco...

Цена: 4275 руб.
ISBN: 1932266690

Купить


Configuring Check Point NGX VPN-1/Firewall-1Configuring Check Point NGX VPN-1/Firewall-1

Автор: Robert Stephens

Book DescriptionConfiguring Check Point NGX VPN-1/FireWall-1 is the perfect reference for anyone migrating from earlier versions of Check Point's flagship firewall/VPN product as well as those deploying VPN-1/FireWall-1 for the first time. This book covers all of NGX's dramatic changes and new, enhanced features. You'll learn how to secure the integrity of your network's data, communications, and applications from a multitude of blended threats. Protect your network against breaches of its perimeter and Internet access points. Also, learn to recognize and prevent internal threats. Written by an all-star team of Check Point-Certified experts, this is the only book you will need to securely and efficiently deploy, troubleshoot, and maintain Check Point NGX. This book is also the perfect complementary study tool for Check Point's certification exams.

Цена: 3697 руб.
Страницы: 608
Год: 2005
ISBN: 1597490318

Купить


Digital Evidence and Computer CrimeDigital Evidence and Computer Crime

Автор: Eoghan Casey

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical...

Цена: 9940 руб.
ISBN: 0121631044

Купить


Fundamentals of Network SecurityFundamentals of Network Security

Автор: Eric Maiwald, Eric Maiwald

This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program. This book introduces a strong foundation that includes security policy, planning, and development of good processes. A step-by-step design teaches students security implementation using recent advances in security tools, such as firewalls, VPN's, encryption, techniques, and intrusion detection devises. Platform-specific defenses are revealed for the desktop, Windows networks, UNIX, Internet, and wireless systems. Laws and government regulation are also covered, including the Patriot Act, homeland security initiatives, and special information on relevant state laws.

Цена: 2993 руб.
ISBN: 0072230932

Купить


Guide to Firewalls and Network Security: Intrusion Detection and VPNsGuide to Firewalls and Network Security: Intrusion Detection and VPNs

Автор: Greg Holden

This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an intelligent choice of firewall technology, and presents basic firewall troubleshooting. It contains pedagogical features including chapter review questions, hands-on exercises and case projects that allow the reader to practice skills as they are learned. In addition, this text maps to the CheckPoint CCSA Certification.

Цена: 16116 руб.
Страницы: 512
Год: 2003
Производитель: Course Technology
ISBN: 0619130393

Купить


How to Cheat at Configuring VmWare ESX ServerHow to Cheat at Configuring VmWare ESX Server

Автор: David Rule

A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress' proven "How to Cheat" methodology to configure and build VMware's ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz! This book will detail the default and custom installation of VMware's ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell...

Серия: How to Cheat

Цена: 3697 руб.
Страницы: 408
Год: 2007
Производитель: Syngress
ISBN: 1597491942

Купить


Integrating ISA Server 2006 with Microsoft Exchange 2007Integrating ISA Server 2006 with Microsoft Exchange 2007

Автор: Fergus Strachan

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy administrator who is under pressure to get the integration done quickly, and done right, the first time. It features "break-out sessions" for issues that require in-depth discussion, "tips and tricks" sections that hone in on and demystify trouble spots, and "FAQs" alphabetized by topic that act as a quick-reference for readers who just want a quick answer to a specific question. Readers will learn how to: Create the protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; Configure SMTP Filtering and SMTP Message Screener; Troubleshoot the SSL...

Цена: 2485 руб.
Страницы: 376
Год: 2008
Производитель: Syngress
ISBN: 1597492752

Купить


Internet Security: A Jumpstart for Systems Administrators and IT ManagersInternet Security: A Jumpstart for Systems Administrators and IT Managers

Автор: Tim Speed, Juanita Ellis

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. · Shield data from both the internal and external intruder · Discover products that can detect and prevent these break-ins · Protect against major losses with the latest incident handling procedures for detecting and...

Цена: 5741 руб.
ISBN: 1555582982

Купить


Juniper MX SeriesJuniper MX Series

Автор: Douglas Richard Hanks Jr., Harry Reynolds

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis LAG, Inline NAT, IPFIX/J-Flow, and many other Juniper MX features. Written by Juniper Network engineers, each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you learn. Delve into the Juniper MX architecture, including the next generation Junos Trio chipset Explore Juniper MX's bridging, VLAN mapping, and support for thousands of virtual switches Add an extra layer of security by combining Junos DDoS protection with firewall filters Create a firewall filter framework that only applies filters specific to your network Discover the advantages of...

Цена: 7190 руб.
Страницы: 902
Год: 2012
Производитель: O'Reilly Media
ISBN: 9781449319717, 1449319718

Купить


MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298

Автор: Elias Khasner, Laura E. Hunter

According to MCP Magazine, there were over 200,000 current Windows 2000 Server MCSEs at the beginning of 2003, and an additional 1.2 million MCP looking to become MCSEs. Syngress has launched a complete line of MCSE 2003 Study Guide/DVD Training Systems(Core 4 plus 3 most popular electives) to publish simultaneously with the launch of the exams. While many industry analysts view the certification market as flat, the reality is that there has been a dramatic reduction in the number of certification series being published since MCSE 2000 and the handful of quality series left should all garner significant gains in market share. The Syngress series was formally published by McGraw-Hill, and the core titles averaged over 40,000 units in retail sales while the electives averaged over 15,000 units each. Through aggressive promotion to our over 70,000 registered users of MCSE 2000 books, strong representation in the retail channel, and the inclusion of a DVD, this comprehensive and...

Цена: 4506 руб.
ISBN: 1932266550

Купить


MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214)MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214)

Автор: Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker

Syngress knows what passing the exam means to you and to your career. And we know that you are often financing your own training and certification; therefore, you need a system that is comprehensive, affordable, and effective. Boasting one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation, the Syngress Study Guide & DVD Training System guarantees 100% coverage of exam objectives. The Syngress Study Guide & DVD Training System includes: - Study Guide with 100% coverage of exam objectives by reading this study guide and following the corresponding objective list, you can be sure that you have studied 100% of the exam objectives. - Instructor-led DVD this DVD provides almost two hours of virtual classroom instruction. - Web-based practice exams Just visit us at www.syngress.com/ certification to access a complete exam simulation. Thank you for giving us the opportunity to serve your certification needs. And be sure...

Цена: 8028 руб.
Страницы: 822
Производитель: Syngress
ISBN: 1-931836-84-1

Купить


Practical VoIP SecurityPractical VoIP Security

Автор: Thomas Porter, Jan Kanclirz Jr

Your Hands-On Guide to Voice over IP (VoIP) This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions. VoIP Isn't Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. ...

Цена: 3581 руб.
Страницы: 564
Год: 2006
Производитель: Syngress
ISBN: 1597490601

Купить


The Fugitive Game : Online with Kevin MitnickThe Fugitive Game : Online with Kevin Mitnick

Автор: Jonathan Littman

Kevin David Mitnick was cyberspace's most wanted hacker. Mitnick could launch missiles or cripple the world's financial markets with a single phone call - or so went the myth. The FBI, phone companies, bounty hunters, even fellow hackers pursued him overthe Internet and through cellular airways. But while Mitnick's alleged crimes have been widely publicized, his story has never been told. Now Jonathan Littman takes us into the mind of a serial hacker. Drawing on over fifty hours of telephone conversations with Mitnick on the run, Littman reveals Mitnick's double life; his narrow escapes; his new identities, complete with college degrees of his choosing; his hacking techniques and mastery of "social engineering"; his obsession with revenge.

Цена: 2589 руб.
ISBN: 0316528692

Купить


The Internet WatchDog Version 2.0 WindowsThe Internet WatchDog Version 2.0 Windows

This network version of the popular Internet WatchDog allows the employer to monitor and record all computer activity -- (even OFF the Internet) by taking random screen captures, logging all computer applications, and recording downloaded graphics. WatchDog prints reports of all activity and will view multiple clients from one machine. Whereas "blocking" software must be updated daily and is relatively useless against video game applications, Internet WatchDog provides the employer with a complete record of the computer user's activity. Includes the Intranet Construction Kit CD and Microsoft Internet Explorer 4.0! Plus it prints reports and enables authorized user to view the activity of several clients. Unlimited users license and free technical support. Runs on Windows 95 and Windows NT machines.

Цена: 2995 руб.
ISBN: 1886801851

Купить


The Internet Watchdog Personal Edition WindowsThe Internet Watchdog Personal Edition Windows

Автор: Atec and Xnet Information Systems

This network version of the popular Internet WatchDog allows the employer to monitor and record all computer activity -- (even OFF the Internet) by taking random screen captures, logging all computer applications, and recording downloaded graphics. WatchDog prints reports of all activity and will view multiple clients from one machine. Whereas "blocking" software must be updated daily and is relatively useless against video game applications, Internet WatchDog provides the employer with a complete record of the computer user's activity! Plus it prints reports and enables authorized user to view the activity of several clients. One - 10 users license and free technical support. Runs on Windows 95 and Windows NT machines.

Цена: 4375 руб.
ISBN: 1886801754

Купить


© 2000- NIV