博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Web Security Field Guide
阅读量:4231 次
发布时间:2019-05-26

本文共 2137 字,大约阅读时间需要 7 分钟。

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp
Hands-on techniques for securing Windows(r) servers, browsers, and network communications
* Create effective security policies and establish rules for operating in and maintaining a security- conscious environment
* Learn how to harden Windows multi-user platforms, including NT, 2000, and XP
* Understand secure installation options for Windows web servers and how to enhance security on existing web and FTP server installations
* Improve security at the end user's workstation, including web browsers, desktops, and laptops
* Evaluate the pros and cons of installing a certificate server and becoming your own Certification Authority
* Learn the Cisco PIX Firewall and Cisco IOS Firewall architecture and how to apply Cisco standard and extended access lists
* Discover ways to test the current state of security and keep it up to date
* Learn to engage end users as part of the overall network security solution

While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient levels of security without constraining performance or scalability. The more reliant organizations become on the Internet to perform daily jobs or conduct transactions, the greater the impact a breach of network security has. Just as Cisco Systems has been an innovator in using the Internet to conduct business, so too is it a market leader in the development and sale of products and technologies that protect data traveling across the Internet. Yet a network security solution is only as strong as its weakest link. Network attacks can occur at any point, including the network connection, the firewall, the web server, or the client. Hardening the defenses at all these points is key to creating an effective, all-encompassing network security solution.

http://rapidshare.com/files/52229132/1587050927.zip
你可能感兴趣的文章
Hibernate 事务、并发(六)
查看>>
JavaFx2.0的介绍
查看>>
struts2.2.x入门应用(一)
查看>>
struts2类型转换(二)
查看>>
struts2输入校验(三)
查看>>
struts2国际化(四)
查看>>
struts2全局结果与异常处理(五)
查看>>
struts2拦截器(六)
查看>>
spring IOC简单应用(一)
查看>>
关于Hibernate创建SessionFactory对象的说明
查看>>
正则表达式(基础篇)
查看>>
正则表达式常用匹配组合汇总
查看>>
javascript(一)
查看>>
SSH设置别名访问远程服务器
查看>>
spark连接hive的两种方式
查看>>
Openfire开发配置,Openfire源代码配置,OpenFire二次开发配置
查看>>
openfire+XMPP实现即时通讯
查看>>
iOS开发之使用XMPPFramework实现即时通信(一)
查看>>
iOS的XMPPFramework简单介绍(实现及时通信)
查看>>
Swift使用XMPPFramework做IM即时通信的Demo
查看>>