Guide to network defense and countermeasures / by Randy Weaver.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Main Library | TK5105.59 .W415 2007 (Browse shelf (Opens below)) | 1 | Checked out | STACKS | 10/28/2021 | 51952000171638 |
![]() |
Main Library | TK5105.59 .W415 2007 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000149774 |
Includes index.
Network defense fundamentals -- Security policy design: risk analysis -- Security policy implementation -- Network traffic signatures -- Virtual private network (VPN) concepts -- VPN implementation -- Intrusion detection system concepts -- Intrusion detection: incident response -- Choosing and designing firewalls -- Firewall topology -- Strengthening and managing firewalls -- Strengthening defense through ongoing management -- Appendix A. SC0-402 objectives -- Appendix B. Security resources.
1 2
There are no comments on this title.