Skip to content

Hardening Network Security

Best in textbook rentals since 2012!

ISBN-10: 0072257032

ISBN-13: 9780072257038

Edition: 2005

Authors: John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric S. Seagren

List price: $43.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This title shows network administrators and IT pros how to harden their network infrastructure against hackers.
Customers also bought

Book details

List price: $43.95
Copyright year: 2005
Publisher: McGraw-Hill Osborne
Binding: Paperback
Pages: 608
Size: 7.25" wide x 8.75" long x 1.25" tall
Weight: 2.244
Language: English

PATRICK KELLY is founder, Chairman, and CEO of PSS/World Medical, Inc., one of the fastest-growing companies in the history of the medical-supply industry. In 1997, Kelly received the Horatio Alger Award, an annual award given to dedicated community leaders who are committed to excellence-as exemplified by remarkable achievements accomplished through honesty, hard work, self-reliance, and perseverance. JOHN CASE is president of The Open-Book Press and an editor-at-large for Inc. magazine. A veteran reporter and analyst of the business world, he worked as a senior writer for Inc. from 1983 to 1996 during which time he wrote numerous cover stories and columns for the magazine. He is also the…    

Do This Now!
Do These 7 Things Before You Do Anything Else
Take it From the Top
Systematically Hardening Your Enterprise
Break the Network into Areas of Common Functionality
Hardening with Identity Management Systems
Hardening Cross Platform Authentication
Implement Secure Centralized Authentication Mechanisms
Mobile Authentication Considerations
Beyond Access Controls - Protecting Stored Data
Hardening Database Access
Hardening Cross Platform Access Controls
Hardening Data Transport Using Encryption
Hardening Remote Clients (Windows, Mac, *nix)
Hardening Wireless
Hardening a Mixed Unix Network
Intrusion Detection and Response
Managing Malicious Code
Hardening Wetware
Once is Never Enough
Auditing and Testing Security
Change Management
Security Patching
Security Review
How to Succeed at Hardening
Politics of Security Management
Security Agnostics