did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780072257038

Hardening Network Security

by
  • ISBN13:

    9780072257038

  • ISBN10:

    0072257032

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2005-01-11
  • Publisher: McGraw-Hill Osborne Media

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $39.99 Save up to $10.00
  • Buy Used
    $29.99

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program

Author Biography

John Mallery (Overland Park, KS) CTO of Clarence M. Kelley and Associates, Inc, a private investigation and security consulting company founded by the former director of the FBI. Member of the Information Technology Security Council of the American Society of Information Security (ASIS). The ASIS is the largest organization of security personnel with over 33,000 members worldwide.

Robert (Mac) McMullin (Blue Springs, MO), CISSP, NSA IAM, MCSE, MCNE, SCSE, CCNA, CCDA, CCA, former Security Analyst for Pomeroy IT Solutions, is a veteran of 18 years experience in the Security and Information Technology industries.

Patrick W. Kelly, (Platte City, MO), CISSP, CCSE, MCSE, MCP+I, currently serves as Information Assurance Engineer for ComGlobal Systems, Inc.

Jason Zann, CISSP (Overland Park, KS) is currently Information Security Consultant for DST Systems.

Paul Love, MS Network Security, CISSP, CISM, and CISA, is currently a Security Manager for Schlumberger.

Series Editor: Roberta Bragg (Grain Valley, MO), CISSP, Security+, ETI-Client Server, Certified Technical Trainer, IBM Certified Trainer, DB2-UDB, Citrix Certified Administrator, MCSE: Security

Table of Contents

Part I: Do This Now!

Chapter 1: Do These 7 Things Before You Do Anything Else

Part II: Take it From the Top. Systematically Hardening Your Enterprise

Chapter 2: Break the Network into Areas of Common Functionality

Chapter 3: Hardening with Identity Management Systems

Chapter 4: Hardening Cross Platform Authentication

Chapter 5: Implement Secure Centralized Authentication Mechanisms

Chapter 6: Mobile Authentication Considerations

Chapter 7: Beyond Access Controls - Protecting Stored Data

Chapter 8: Hardening Database Access

Chapter 9: Hardening Cross Platform Access Controls

Chapter 10: Hardening Data Transport Using Encryption

Chapter 11: Hardening Remote Clients (Windows, Mac, *nix)

Chapter 12: Hardening Wireless

Chapter 13: Hardening a Mixed Unix Network

Chapter 14: Intrusion Detection and Response

Chapter 15: Managing Malicious Code

Chapter 16: Hardening Wetware

Part III: Once is Never Enough

Chapter 17: Auditing and Testing Security

Chapter 18: Change Management

Chapter 19: Security Patching

Chapter 20: Security Review

Part IV: How to Succeed at Hardening

Chapter 21: Politics of Security Management

Chapter 22: Security Agnostics

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program