Network performance and security : testing and analyzing using open source and low-cost tools
Enregistré dans:
Auteur principal: | |
---|---|
Support: | E-Book |
Langue: | Anglais |
Publié: |
San Diego :
Elsevier Science,
2016.
|
Sujets: | |
Autres localisations: | Voir dans le Sudoc |
Résumé: | Résumé éditeur : Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits." |
Accès en ligne: | Accès à l'E-book |
Résumé: | Résumé éditeur : Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits." |
---|---|
Description: | Titre provenant de l'écran-titre. La pagination de l'édition imprimée correspondante est de 382 p. |
Support: | Navigateur Internet ; lecteur de fichier PDF. |
Bibliographie: | Bibliogr. Index. |
ISBN: | 9780128036013 (ebook) |
Accès: | L'accès à cette ressource est réservé aux usagers des établissements qui en ont fait l'acquisition |