Security Complete, 2nd Edition

by
Edition: 2nd
Format: Paperback
Pub. Date: 2002-10-01
Publisher(s): Sybex
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $26.24

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This second edition of Security Complete is a one-of-a-kind book -- valuable both for its broad content and its low price. The book contains the essentials you need to know about securing your environment -- from evaluating how much security you really need to auditing an existing network system.

Author Biography

Sybex editors and authors have pulled together the best information from the company's Linux library to create this collection of essential information. Sources include Mastering Red Hat Linux 7.1, Mastering GNOME, Linux Samba Server Administration, Linux Security, Linux Sendmail Administration, and Linux Command Instant Reference.

Table of Contents

Introduction xxv
Part I Network Security Fundamentals 1(110)
A Systems Approach to Information Networks
Adapted from Mastering™ Network Security, Second Edition
3(22)
Chris Brenton
Cameron Hunt
Security as a Process
Adapted from Mastering™ Network Security, Second Edition
25(20)
Chris Brenton
Cameron Hunt
A Bird's-Eye View of Topology Security
Adapted from Mastering™ Network Security, Second Edition
45(38)
Chris Brenton
Cameron Hunt
Authentication and Encryption
Adapted from Mastering™ Network Security, Second Edition
83(28)
Chris Brenton
Cameron Hunt
Part II Operating Systems and Servers 111(260)
Windows 2000 Security
Adapted from Windows® 2000 Server: 24seven™
113(68)
Matthew Strebe
Living with Windows XP Professional Strict Security
Adapted from Mastering™ Windows® XP Professional, Second Edition
181(26)
Mark Minasi
Securing Your NetWare 6 Network
Adapted from Mastering™ NetWare® 6
207(44)
James E. Gaskin
Linux System Installation and Setup
Adapted from Linux Security
251(34)
Ramon J. Hontanon
Linux System Monitoring and Auditing
Adapted from Linux Security
285(32)
Ramon J. Hontanon
Samba Security Considerations
Adapted from Linux Samba Server Administration
317(54)
Roderick W. Smith
Part III Firewalls 371(160)
Understanding Firewalls
Adapted from Firewalls 24seven™, Second Edition
373(32)
Matthew Strebe
Charles Perkins
Packet Filtering
Adapted from Firewalls 24seven™, Second Edition
405(16)
Matthew Strebe
Charles Perkins
Network Address Translation
Adapted from Firewalls 24seven™, Second Edition
421(24)
Matthew Strebe
Charles Perkins
Windows Firewalls
Adapted from Firewalls 24seven™, Second Edition
445(26)
Matthew Strebe
Charles Perkins
Unix Firewalls
Adapted from Firewalls 24seven™, Second Edition
471(26)
Matthew Strebe
Charles Perkins
Linux Network-Layer Firewalls
Adapted from Linux Security
497(34)
Ramon J. Hontanon
Part IV Cisco Security Specialist (CSS1) Highlights 531(226)
PIX Firewall Basics
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study Guide
533(32)
Todd Lammle
Tom Lancaster
Eric Quinn
Justin Menga
PIX Firewall Configuration
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study Guide
565(48)
Todd Lammle
Tom Lancaster
Eric Quinn
Justin Menga
Introduction to Virtual Private Networks
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study Guide
613(30)
Todd Lammle
Tom Lancaster
Eric Quinn
Justin Menga
Introduction to Cisco VPN Devices
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study Guide
643(20)
Todd Lammle
Tom Lancaster
Eric Quinn
Justin Menga
Installing Cisco Secure IDS Sensors and IDSMs
Adapted from CSS1™/CCIP™: Cisco® Security Specialist Study Guide
663(68)
Todd Lammle
Tom Lancaster
Eric Quinn
Justin Menga
Sensor Configuration
Adapted from CSS1™/CCIP™: Cisco Security Specialist Study Guide
731(26)
Todd Lammle
Tom Lancaster
Eric Quinn
Justin Menga
Part V Security-Related MCSE Highlights 757(118)
Evaluating the Impact of the Security Design on the Technical Environment
Adapted from MCSE: Windows® 2000 Network Security Design Study Guide, Second Edition
759(34)
Gary Govanus
Robert King
Designing Security Baselines
Adapted from MCSE: Windows® 2000 Network Security Design Study Guide, Second Edition
793(44)
Gary Govanus
Robert King
Designing the: Security Solution
Adapted from MCSE: Windows® 2000 Network Security Design Study Guide, Second Edition
837(38)
Gary Govanus
Robert King
Glossary of Networking Terms 875(46)
Adapted from the Network+™ Study Guide, Third Edition
David Groth
Index 921

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.