四川大学·国家示范性软件学院

......因为有你,生活更美好!.......

  • 增大字号
  • 缺省字号
  • 减小字号

network-security-a-beginners-guide-second-edition.pdf
 
This location is for Registered Users Only.
Perhaps you need to login or register..

Description:

Books for beginners fall into two categories: the Dummies or Idiot’s Guide books that treat the reader like an imbecile, and those that treat novices as mature and intelligent. Network Security: A Beginner’s Guide falls into the second category. The reader comes away with a lucid understanding of the fundamentals of network security without being talked down to. Information security managers have a rough job. Although more money is being spent on information systems security, systems are increasingly complex, and complex systems are difficult to protect. This book is a good starting point for network managers and systems administrators who need clear instruction on how to create and run a secure technology infrastructure. As security of information systems increases in importance, it is becoming critical for everyone in the IT department to understand how all the components work. While not every member of manager needs to know how to install and configure firewalls, intrusion detection systems, and e-mail filters, they must nonetheless understand the significance of such technologies. This book covers those issues along with other significant information. Besides security products, the book gets into the nitty-gritty of security architectures, hacking, encryption, and operating systems. It includes a set of blueprints that describe key systems for designing an effective security architecture. The book concludes with the question of whether UNIX of Windows NT is more secure, a topic that has been fodder for countless debates. Avoiding a discussion of the minutiae of each operating system, the author astutely note that the answer to the question is not within the operating system itself but rather with the system administrator. That’s good counsel from a good book. Reviewer: Ben Rothke is a New York-based senior security analyst with Camelot Information Technologies. He is a member of ASIS. (Adams, David Security Management )

All companies rely on some security mechanisms to ensure their corporate privacy and information integrity. In many cases, the ability of the technician to explain a system’s vulnerabilities to managers in order to acquire funding is as important as the technical skills to build the system. This book addresses a wide range of topics, from security basics to policies, practices, and practical solutions. Though intended for network administrators, this also acts as a good primer on security concepts for the lay computer user. A rock-solid resource for all libraries. (Library Journal ) --This text refers to an alternate Paperback edition.

Submitted By:
赵晟凯 (0743111090)
Submitted On:
19 Jan 2010
File Size:
0.00 Kb
Downloads:
0
File Version:
978-0072229578
File Author:
赵晟凯
File HomePage:
Click to visit site
File Date:
14 Jan 2010
Rating:
Total Votes:0
Be the first to comment! Please sign in or register.