,

Network Performance and Security

Testing and Analyzing Using Open Source and Low-Cost Tools

Paperback Engels 2016 9780128035849
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory.

 

The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.

Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

Specificaties

ISBN13:9780128035849
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction: Practical Security and Performance Testing</p> <p>Ch. 1: Getting organized: Asset Inventory; knowing what you have</p> <p>Ch. 2: Locking down Access: Internet, Wi-Fi, Wired Zones, and VPN</p> <p>Ch. 3: Securing BYOD device access</p> <p>Ch. 4: Hardening the Server</p> <p>Ch. 5: Internal Security Threats and defending assets and zones</p> <p>Ch. 6: How to test the Firewall and IPS/IDS Effectively</p> <p>Ch. 7: Security Device Deployment Patterns</p> <p>Ch. 8: Continuous Testing</p> <p>Ch. 9: Defending against penetration attacks</p> <p>Ch. 10: How to write and test a Request for Proposal</p> <p>Ch. 11: Security "Fire drills"</p> <p>Glossary</p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Network Performance and Security