Lybrary.com: ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Internet / Security

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

$59.95
| £47.49 | €54.48 | Ca$82.31 | Au$82.19
by Chris Chapman
What is this?DRM-EPUB by download  |  $59.95
What is this?DRM-PDF by download  |  $59.95
add to wish list
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools by Chris Chapman

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory.

 

The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.

Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

    • Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested
    • Focuses on practical, real world implementation and testing
    • Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing
    • Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration
    • Provides analysis in addition to step by step methodologies
      To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.


      SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
      or call in the US toll free 1-888-866-9150 product ID: 822507

      Ebook Details
      Pages: 380
      Size: 49.0 MB
      Publisher: Syngress
      Date published:   2016
      ISBN: 9780128036013 (DRM-EPUB)
      2370007438914 (DRM-PDF)

      DRM Settings
      Copying:allowed
      Printing:allowed
      Read Aloud:  not allowed

    This product is listed in the following category:

    Nonfiction > Computers > Internet > Security

    This author has products in the following categories:

    Nonfiction > Science > Geophysics
    Nonfiction > Computers > Internet > Security
    Nonfiction > Business & Economics > Insurance > Risk Assessment & Management

    If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

    Submit 5 page SummaryWhat is this?

    05/28/2017
    © 2017 Lybrary.com