Kirjojen hintavertailu. Mukana 12 209 252 kirjaa ja 12 kauppaa.

Kirjailija

Love Paul

Kirjat ja teokset yhdessä paikassa: 2 kirjaa, julkaisuja vuosilta 2004-2005, suosituimpien joukossa Hardening Linux. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

2 kirjaa

Kirjojen julkaisuhaarukka 2004-2005.

Hardening Linux

Hardening Linux

John Terpstra; Love Paul; Ronald Reck; Scanlon Tim

McGraw-Hill Professional
2004
nidottu
Recognized Linux expert John Terpstra and security evangelist and 25-year IT industry veteran, Roberta Bragg cut through the noise to show you how to bullet proof your system before you are hacked!No more “hack and patch!” Harden your Linux system before it is hacked. “Do this NOW, here’s why, here’s how and don’t stop there!”Administrators and IT Pros have to do more with less. They don’t want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. Hacking Exposed Linux shows how to test, hack, and find the security holes and fix them. Hardening Linux shows you how to secure your Linux system to work securely in the first place
Hardening Network Security

Hardening Network Security

Mallery John; Zann Jason; Patrick Kelly; Wesley Noonan; Eric Seagren; Love Paul; Kraft Rob; Mark O'Neill

McGraw-Hill Professional
2005
nidottu
Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.Features a four-part hardening methodology:Do This Now!--Checklist of immediate steps to take to lockdown your system from further attackTake It From The Top--Systematic approach to hardening your enterprise from the top downOnce Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditingHow to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program