By Douglas W. Frye 235 pages | PDF | 9.191 KB | Download | Password: network Technology is progressing at an astounding pace, and many organizations are working so hard to implement the technologies they need to survive need to understand how their network security policies and procedures regimen fits into the picture. Technical workers and management tend to have one thing in common: they don’t appreciate the constraints the other works within when going about their jobs. Management criticizes the system administrators for not understanding how the best technical solution isn’t appropriate for meeting the company’s goals, while the system administrators criticize management for not understanding that what they’re asking for is impossible, overly expensive or foolhardy. While some counter-examples do exist in the IT world, quite often those in charge of running a business or governmental organization are professional managers rather than professional technologists with managerial training. Most …
Read More »Tag Archives: Network security
How to Cheat at Securing Your Network
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling “How to Cheat…” series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. General Security Concepts: Access Control, Authentication, and Auditing See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. General Security Concepts: Attacks …
Read More »How to set up and run a basic network
Did you know that by networking your PCs, you can easily share files, back up important data, and more
Read More »