Network Security for Dummies (For Dummies (Computer/tech))

個数:
電子版価格
¥3,845
  • 電書あり

Network Security for Dummies (For Dummies (Computer/tech))

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 380 p.
  • 言語 ENG
  • 商品コード 9780764516795
  • DDC分類 005.8

Full Description

A hands-on, do-it-yourself guide to securing and auditing a network

CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your favorite Web sites and stolen thousands of credit card numbers. The FBI just released a new report on computer crime that's got you shaking in your boots. The experts will tell you that keeping your network safe from the cyber-wolves howling after your assets is complicated, expensive, and best left to them. But the truth is, anybody with a working knowledge of networks and computers can do just about everything necessary to defend their network against most security threats. Network Security For Dummies arms you with quick, easy, low-cost solutions to all your network security concerns. Whether your network consists of one computer with a high-speed Internet connection or hundreds of workstations distributed across dozens of locations, you'll find what you need to confidently:



Identify your network's security weaknesses
Install an intrusion detection system
Use simple, economical techniques to secure your data
Defend against viruses
Keep hackers at bay
Plug security holes in individual applications
Build a secure network from scratch

Leading national expert Chey Cobb fills you in on the basics of data security, and he explains more complex options you can use to keep your network safe as your grow your business. Among other things, you'll explore:



Developing risk assessments and security plans
Choosing controls without breaking the bank
Anti-virus software, firewalls, intrusion detection systems and access controls
Addressing Unix, Windows and Mac security issues
Patching holes in email, databases, Windows Media Player, NetMeeting, AOL Instant Messenger, and other individual applications
Securing a wireless network
E-Commerce security
Incident response and disaster recovery

Whether you run a storefront tax preparing business or you're the network administrator at a multinational accounting giant, your computer assets are your business.  Let Network Security For Dummies provide you with proven strategies and techniques for keeping your precious assets safe.

Contents

Introduction 1

Part I: The Path to Network Security 7

Chapter 1: Starting Down the Road to Network Security 9

Chapter 2: Evaluating and Documenting Your Network Situation 39

Chapter 3: Assessing the Risks 53

Chapter 4: Planning and Implementing Security Policies and Procedures 65

Part II: Your Network Is Your Business 83

Chapter 5: Choosing Controls without Breaking the Bank 85

Chapter 6: You Could Be Liable If 101

Chapter 7: Building a Secure Network from Scratch 117

Part III: The All-Important Security Mechanisms 127

Chapter 8: Anti-Virus Software 129

Chapter 9: Firewalls and Brimstone 141

Chapter 10: Intrusion Detection Systems 155

Chapter 11: Access Controls/Privileges 167

Part IV: Special Needs Networking 189

Chapter 12: When Patchwork Doesn't Mean Quilting: Unix Systems 191

Chapter 13: Boarding Up Your MS Windows 201

Chapter 14: Is Anything Eating Your Mac? 221

Chapter 15: Application Software Patching 233

Chapter 16: Very Precious Network Security 251

Chapter 17: Securing Your Wireless Network 261

Chapter 18: E-Commerce Special Needs 273

Part V: Dealing with the Unthinkable 287

Chapter 19: Emergency! Incident Response 289

Chapter 20: Disaster Recovery 305

Chapter 21: Who Did the Dirty: Computer Forensics 321

Part VI: The Part of Tens 335

Chapter 22: Ten Best Security Practices 337

Chapter 23: Ten Best Security Web Sites 345

Chapter 24: Ten Security Tools Every Network Security Geek Should Have 349

Chapter 25: Ten Questions to Ask a Security Consultant 353

Index 359