NT 4 Network Security

NT 4 Network Security

Author: Matthew Strebe

Publisher: Sybex

Published: 1999

Total Pages: 980

ISBN-13:

DOWNLOAD EBOOK

Excellent for administrators of an NT network, this comprehensive and updated edition provides readers with the latest information on hacks, attacks and patches. The CD-ROM includes evaluation and demonstration versions of commercial firewalls, scanners and proxy servers, together with security tools for NT.


Microsoft Windows NT 4.0 Security, Audit, and Control

Microsoft Windows NT 4.0 Security, Audit, and Control

Author: James G. Jumes

Publisher:

Published: 1999

Total Pages: 340

ISBN-13: 9781572318182

DOWNLOAD EBOOK

"The Microsoft Windows NT 4.0 Security" offers the MIS professional, network architect, administrator, or webmaster a set of guidelines for securing, auditing, and controlling networks running on Windows NT 4.0. A computer security plan that is well thought out, implemented, and monitored makes authorized use of network computers easy and unauthorized use or accidental damage difficult if not impossible. Issues are introduced and explained conceptually, then the reader is walked through tested procedures for establishing a secure installation. Includes 120-day evaluation copy Microsoft Internet Information Server on CD


Information Assurance

Information Assurance

Author: Andrew Blyth

Publisher: Springer Science & Business Media

Published: 2013-04-17

Total Pages: 335

ISBN-13: 144713706X

DOWNLOAD EBOOK

When you first hear the term Information Assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information Assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35 years old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the more recent past, the term Information Warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations - after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the three classes of Information Warfare: Class 1- Personal Information Warfare. Class 2 - Corporate Information Warfare. Class 3 - Global Information Warfare. Political sensitivities lead to "warfare" being replaced by "operations", a much more "politically correct" word. Unfortunately, "operations" also has an offensive connotation and is still the terminology of the military and governments.


Internet Security with Windows NT

Internet Security with Windows NT

Author: Mark Joseph Edwards

Publisher: Duke University Press

Published: 1998

Total Pages: 556

ISBN-13: 9781882419623

DOWNLOAD EBOOK

Few subjects receive as much attention today as computer security requirements to protect company resources. The Internet and Intranets have brought a whole new set of problems and issues. Readers will learn how to secure their Windows NT system by selecting the right NT security tools and add-on devices.


Maximum Security

Maximum Security

Author: Anonymous

Publisher: Sams Publishing

Published: 2003

Total Pages: 981

ISBN-13: 0672324598

DOWNLOAD EBOOK

Security issues are at an all-time high. This volume provides updated, comprehensive, platform-by-platform coverage of security issues, and includes to-the-point descriptions of techniques hackers use to penetrate systems. This book provides information for security administrators interested in computer and network security and provides techniques to protect their systems.


Internet Security Made Easy

Internet Security Made Easy

Author: Douglas Schweitzer

Publisher: Amacom Books

Published: 2002

Total Pages: 306

ISBN-13: 9780814471425

DOWNLOAD EBOOK

Schweitzer offers this nontechnical, step-by-step guide to help computer users of all levels to better understand how the Internet works, and how to enjoy the benefits of the Internet while still maintaining computer security. Topics include secure Web browsing, cookie monitoring and removal, installing antivirus software, e-mail attachments and spam, securing a Web server, public key infrastructure, secure remote access and virtual private networks, and handling hacker attacks and cybercrime. The author is a vice president at an actuarial consulting firm, where he is responsible for corporate network design and security. Annotation copyrighted by Book News Inc., Portland, OR.


MCSA / MCSE: Windows 2000 Network Security Administration Study Guide

MCSA / MCSE: Windows 2000 Network Security Administration Study Guide

Author: Bill English

Publisher: John Wiley & Sons

Published: 2006-07-14

Total Pages: 534

ISBN-13: 0782151655

DOWNLOAD EBOOK

Here's the book you need to prepare for Exam 70-214, Implementing and Administering Security in a Microsoft Windows 2000 Network. This Study Guide provides: In-depth coverage of every exam objective Practical information on managing a secure Windows 2000 network Hundreds of challenging practice questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine and electronic flashcards Authoritative coverage of all exam objectives, including: Implementing, Managing, and Troubleshooting Baseline Security Implementing, Managing, and Troubleshooting Service Packs and Security Updates Implementing, Managing, and Troubleshooting Secure Communication Channels Configuring, Managing, and Troubleshooting Authentication and Remote Access Security Implementing and Managing a Public Key Infrastructure (PKI) and Encrypting File System (EFS) Monitoring and Responding to Security Incidents Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.


Computer Network Security and Cyber Ethics, 4th ed.

Computer Network Security and Cyber Ethics, 4th ed.

Author: Joseph Migga Kizza

Publisher: McFarland

Published: 2014-03-27

Total Pages: 240

ISBN-13: 0786493925

DOWNLOAD EBOOK

In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individuals who build the hardware and design and develop the software that run the networks that store our vital information. Addressing security issues with ever-growing social networks are two new chapters: "Security of Mobile Systems" and "Security in the Cloud Infrastructure." Instructors considering this book for use in a course may request an examination copy here.


MCSE Supporting and Maintaining a Windows NT Server 4.0 Network

MCSE Supporting and Maintaining a Windows NT Server 4.0 Network

Author: Dennis Maione

Publisher: Que Publishing

Published: 2001

Total Pages: 762

ISBN-13: 9780735711570

DOWNLOAD EBOOK

The leading certification product covering one of the hottest MCSE 2000 electives. This book not only prepares the reader for the exam, it provides them with the real-world ability to support and maintain networks that use Microsoft Windows NT Server 4.0 as a primary operating system in a mixed network. The book maps to the actual exam objectives, providing readers with an excellent study tool that is thorough, accurate, and reader-friendly.


Computer Security

Computer Security

Author: John S. Potts

Publisher: Nova Publishers

Published: 2002

Total Pages: 158

ISBN-13: 9781590335215

DOWNLOAD EBOOK

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.