logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Active Defense A Comprehensive Guide To Network Security Chris Brenton

  • SKU: BELL-918546
Active Defense A Comprehensive Guide To Network Security Chris Brenton
$ 31.00 $ 45.00 (-31%)

4.3

78 reviews

Active Defense A Comprehensive Guide To Network Security Chris Brenton instant download after payment.

Publisher: Sybex Inc
File Extension: PDF
File size: 6.35 MB
Pages: 374
Author: Chris Brenton, Cameron Hunt
ISBN: 9780585476933, 9780782129168, 0585476934, 0782129161
Language: English
Year: 2001

Product desciption

Active Defense A Comprehensive Guide To Network Security Chris Brenton by Chris Brenton, Cameron Hunt 9780585476933, 9780782129168, 0585476934, 0782129161 instant download after payment.

In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen. Paying individual attention to NetWare, Windows and Unix environments, they describe how networks operate, and the authors discuss network cables, protocols, routers, bridges, hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls, Cisco router configuration settings, intrusion detection systems, authentication and encryption software, Virtual Private Networks (VPNs), viruses, trojans and worms.

Related Products