Part II: Defending Your Perimeter and Critical Internet Infrastructure

Chapter List

Chapter 4: Reliable Connectivity
Chapter 5: Securing the Perimeter
Chapter 6: Redefining the DMZSecuring Critical Systems
Chapter 7: Intrusion Detection and Prevention
Chapter 8: E-mail Gateways, Filtering, and Redundancy
Chapter 9: Data LeaksExploiting Egress
Chapter 10: Sinkholes and Backscatter
Chapter 11: Securing Wireless Networks


Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net