|
Showing 1 - 6 of
6 matches in All Departments
*Covers the latest standards and those being developed in an
ever-evolving field
*Provides insight into the latest technology of video and data over
wireless networks and how convergence will be a driving force in
this industry
*Provides an understanding of the true capabilities behind each
vendor's solution to allow for informed buying decisions
A recent survey of 500 U.S. companies with multiple locations found
that 81% are planning to implement IP Telephony on their local area
networks (LANs) in 2003, and two-thirds are looking at convergence
for their wide area networks (WANs) as well. This includes voice,
video and data over hard line and wireless networks.
Today, new standards and technologies are being developed to
support convergence and voice over IP (VoIP) and Video over IP and
wireless. Because convergence covers the voice and data world, it
will be critical to understand all of these environments.
This book provides detailed information on convergence network
models, protocol stacks, routing algorithms, gateways and switches
required to support these networks.
*Covers the latest standards and those being developed in an
ever-evolving field
*Provides insight into the latest technology of video and data over
wireless networks and how convergence will be a driving force in
this industry
*Provides an understanding of the true capabilities behind each
vendor's solution to allow for informed buying decisions
Internet Security incorporates not only the technology needed to
support a solid security strategy but also those policies and
processes that must be incorporated in order for that strategy to
work.
New methods of breaking into corporate networks are resulting in
major losses. This book provides the latest information on how to
guard against attacks and informs the IT manager of the products
that can detect and prevent break-ins. Crucial concepts such as
authentication and encryption are explained, enabling the reader to
understand when and where these technologies will be useful. Due to
the authors' experiences in helping corporations develop secure
networks, they are able to include the newest methods for
protecting corporate data.
.Shield data from both the internal and external intruder
.Discover products that can detect and prevent these break-ins
.Protect against major losses with the latest incident handling
procedures for detecting and recovering data from new viruses
.Get details of a full security business review from performing the
security risk analysis to justifying security expenditures based on
your company's business needs"
The Internet is connecting enterprises into a global economy.
Companies are exposing their directories, or a part of their
directories, to customers, business partners, the Internet as a
whole, and to potential "hackers." If the directory structure is
compromised, then the whole enterprise can be at risk. Security of
this information is of utmost importance.
This book provides examples and implementation guidelines on
building secure and structured enterprise directories. The authors
have worked with corporations around the world to help them design
and manage enterprise directories that operate efficiently and
guard against outside intrusion. These experts provide the reader
with "best practices" on directory architecture, implementation,
and enterprise security strategies.
The Internet Security Guidebook provides a complete analysis of an
enterprise's Internet security. Strategies, steps, and procedures
for conducting business securely on the Internet are discussed and
reviewed. Very few organizations take the needed precautions to
protect their Internet enterprise. Protection is not simply a
firewall or technology; it is a strategy that encompasses risk,
trust, business goals, security processes, and technology. The
holistic approach offered in this book evaluates security needs in
relation to business goals and the current attacks on the global
Internet. The goal of The Internet Security Guidebook is to protect
the business-computing environment by keeping our online
enterprises functioning correctly and securely.
Unlike other books available, this book contains a complete guide
to Internet security that is accessible to both novices and
computer professionals. The specific steps discussed and
illustrated show the reader how to implement security from the
individual process to the complete corporate enterprise. The reader
will also learn about resources that can help such as the Computer
Emergency Response Team (CERT), the Federal Bureau of Investigation
(FBI), and even their own software vendors.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on
the Internet. Following the success of The Internet Security
Guidebook, the authors have used their expertise to create a book
specifically addressing home computers and traveling notebooks.
Included in this book is a comprehensive list of vendors and
services. Included are these key elements: protecting your PC on
the Internet, home firewall software, how to set up a home network,
protecting your PC on the road, and protecting your PC via DSL
and/or cable modem.
A comprehensive list of vendors and services that you can download
or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems
|
You may like...
Elvis
Baz Luhrmann
Blu-ray disc
R191
R171
Discovery Miles 1 710
|