Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
Collect the necessary hardware and software and assemble your own network lab
Configure a bootable Linux CD
Explore various methods for gathering information about existing security
Identify automated attack and penetration tools
Understand cryptographic systems and encryption and authentication attacks
Learn to find, identify, and defeat malware
Address the special protection needs of wireless systems
Use Snort® to build an IDS that will help to detect and identify attacks in real time
DVD includes tools for actually building and implementing security solutions
Open source tools
A bootable version of Linux
Was delivered right to my door step
Excellent condition. Great job!!! The tab looks cool and it was the perfect present for anyone.
This is a good book for people starting out in network security. Veterans might want it for the clear explanations. Read morePublished on June 15, 2013 by John Gardener
This is a well laid out guide for creating a test lab. It's great for beginners looking at getting into the computer security or networking field. Read morePublished on March 24, 2012 by Dan from DC