32 products were found matching your search for Security Administrator in 2 shops:
-
CCSA NG: Check Point Certified Security Administrator Study Guide
Vendor: Abebooks.com Price: 130.43 $Here's the book you need to prepare for Check Point's VPN-1/FireWall-1 Management I NG exam, #156-210. Written by a Check Point security expert who knows exactly what it takes to pass the test, this study guide provides: * Assessment testing to focus and direct your studies * In-depth coverage of official exam objectives * Hundreds of challenging review questions, in the book and on the CD Authoritative coverage of all exam objectives, including: * Defining, administering, and troubleshooting an active security policy * Optimizing VPN-1/FireWall-1 performance * Creating network objects and groups * Performing basic log management operations * Configuring anti-spoofing on the firewall * Setting up user, client, and session authentication in a VPN-1/FireWall-1 environment * Configuring and setting up network address translation * Backing up critical VPN-1/FireWall-1 information * Uninstalling VPN-1/FireWall-1
-
365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
Vendor: Abebooks.com Price: 57.95 $Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 2.03
-
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs
Vendor: Abebooks.com Price: 55.73 $New! This book is in the same immaculate condition as when it was published 2.45
-
UNIX(R) System Security: A Guide for Users and System Administrators
Vendor: Abebooks.com Price: 23.00 $Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.
-
Cisco Systems ASA Security Appliance Hands-On Training for Accidental Administrators: Student Exercise Manual
Vendor: Abebooks.com Price: 21.05 $This is a classroom lab manual. It is not designed for use in a standalone environment. This is the Cisco ASA Security Appliance student lab manual designed for use in an instructor-led classroom setting. It is the companion to the book Cisco ASA for Accidental Administrators. Includes 72 hands-on exercises including: password recovery, building a configuration from scratch, previewing commands, using ASDM to build a configuration, analyzing the base configuration, backing up and restoring configurations and software images, remote logging options, how to configure Telnet and SSH, setting up login banners, remote authentication using RADIUS, Kerberos, and LDAP, site-to-site VPNs, remote access VPNs, configuring a DMZ, port scanning with nmap, and transparent mode. Each exercise is explained in step-by-step detail in order to create several different firewall configurations, anticipating real world scenarios.
-
365 Administrator MS-102 Exam Guide: Master the Microsoft 365 Identity and Security Platform and confidently pass the MS-102 exam
Vendor: Abebooks.com Price: 32.79 $Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
-
Kensington AC12 Security Charging Cabinet - Universal Device
Vendor: Bulkofficesupply.com Price: 873.12 $Security charging cabinet features 12 slide-out drawers to provide an easier check-in/check-out experience for teachers or administrators. Its tamper-resistant door keeps your devices securely locked away between each use. Four rubber wheels allow you to spin and roll this cabinet freely in any direction for effortless mobility in tight spaces. Locking foot pedals on the two front wheels can be engaged with a simple push downward to severely limit movement. AC power strip accommodates each device's own power cord to safely charge all 12 devices simultaneously. Rugged dividers with convenient cable routing help manage cord clutter. Plus, its universal design fits a variety of devices up to 14" , including Chromebooks, Surface/Surface Pros, MacBook Airs, iPads, Galaxy Tabs and more.
-
MediaWiki Administrators' Tutorial Guide Install, manage, and customize your MediaWiki installation
Vendor: Abebooks.com Price: 42.98 $This book covers the open-source MediaWiki wiki engine from installation and getting started through structuring your collaborative website, advanced formatting, images, multimedia, security, and managing users to backing up, restoring, and migrating your installation and creating new MediWiki templates. The author, Mizanur Rahman, is a Senior Software Engineer at ReliSource Technologies. The book has a fast-paced, friendly tutorial style and uses a fun example to teach all of MediaWiki's key features. This book is for competent computer users who want to run MediaWiki. They should have some knowledge of HTML and have used a wiki before. No PHP knowledge is required for most of the book, although some chapters at the end include some PHP code.
-
Microsoft® Forefront⢠Threat Management Gateway (TMG) Administrator's Companion
Vendor: Abebooks.com Price: 25.53 $Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion prevention, proxy, caching, filtering Configure security for the Web, Microsoft® Exchange Server, and SharePoint® Products and Technologies Implement remote access and site-to-site VPNs Select and configure clients Monitor and troubleshoot protected systems with Network Monitor 3 and other tools Use scripting to configure systems and automate administration Plus, get a fully searchable eBook on the companion CD A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
-
Linux Firewalls: Enhancing Security with Nftables and Beyond
Vendor: Abebooks.com Price: 41.23 $The Definitive Guide to Building Firewalls with Linux As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security. An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more. Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise. Inside, you’ll find just what you need to Install, configure, and update a Linux firewall running either iptables or nftables Migrate to nftables, or take advantage of the latest iptables enhancements Manage complex multiple firewall configurations Create, debug, and optimize firewall rules Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions Harden systems against port scanning and other attacks Uncover exploits such as rootkits and backdoors with chkrootkit
-
Writing Information Security Policies
Vendor: Abebooks.com Price: 39.77 $Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.
-
Inside Network Perimeter Security
Vendor: Abebooks.com Price: 49.95 $Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
-
Hacking Exposed: Network Security Secrets & Solutions, Second Edition (Hacking Exposed)
Vendor: Abebooks.com Price: 73.92 $High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies
-
Safe Schools: A Security And Loss Prevention Plan
Vendor: Abebooks.com Price: 47.94 $Safe Schools: A Security and Loss Prevention Plan is an excellent reference for school administrators, school safety personnel and law enforcement for creating a safe and secure academic environment. Addressing a wide range of security programs and measures which have been proven to be effective, Safe Schools serves as a manual for safeguarding students, employees, visitors, material and the property of school district.This book addresses a wide range of security programs and measures which have been proven to be effective. Essential topics discussed in this manual are:Bomb threats and checklistsDrug and alcohol testingRandom inspectionMetal detector and search guidelinesEmergency and response plansSecurity assessment and survey toolsLoss prevention and physical securityIntrusion detection systemsEmployee and security education and trainingMinimum training standardsOperating proceduresCrime prevention, security awareness and support of security programs are more effective and less costly than dealing with criminal incidents and public relations challenges after the fact. Safe Schools: A Security and Loss Prevention Plan allows school personnel to become proactive instead of reactive and to gain control of the school environment.Provides a model security and loss prevention plan with sample security surveys, reports,and programsWritten by an author with more than 28 years training, leadership, working experience, and knowledge in the field of law enforcement and security managementServes as an excellent reference source for anyone involved in school security
-
Sap System Security Guide (sap Press)
Vendor: Abebooks.com Price: 93.35 $If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Then get the technical know-how to identify vulnerabilities, defend your system from internal and external threats, and pass audits. Secure your SAP system from the ground up! * Configure application, network, and infrastructure security * Set up identity and access management: roles, authorizations, SSO * Strengthen the security of SAP NetWeaver systems, including SAP S/4HANA, SAP Business Suite, SAP Fiori, and more Security Basics Define system log on and password rules, secure transactions and clients, and learn to use the Common Cryptographic Library. User Management Learn to create users, define roles, and implement authorizations and authentication to ensure the right people have the right access in your system. External Security Make sure your system's database and infrastructure are protected from unauthorized external access using encryption, the Internet Connection Manager (ICM), the SAP Virus Scan Interface, firewalls, and more. * Transaction locks * CommonCryptoLib * Single sign-on (SSO) * Authorizations * Transport security * Audit logging * Patching * Client locking * Secure communication * Database security
-
SELinux by Example: Using Security Enhanced Linux: Using Security Enhanced Linux
Vendor: Abebooks.com Price: 50.14 $SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel—and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions—it’s easier than ever to take advantage of its benefits. SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies— including the powerful new Reference Policy—showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. · Thoroughly understand SELinux’s access control and security mechanisms · Use SELinux to construct secure systems from the ground up · Gain fine-grained control over kernel resources · Write policy statements for type enforcement, roles, users, and constraints · Use optional multilevel security to enforce information classification and manage users with diverse clearances · Create conditional policies that can be changed on-the-fly · Define, manage, and maintain SELinux security policies · Develop and write new SELinux security policy modules · Leverage emerging SELinux technologies to gain even greater flexibility · Effectively administer any SELinux system
-
Eberstadt and Forrestal: A National Security Partnership, 1909-1949 (Volume 21) (Williams-Ford Texas A&M University Military History Series)
Vendor: Abebooks.com Price: 48.75 $On the heels of New Deal administrators, an army of business executives arrived in Washington in 1940 to prepare the nation for war. Among this contingent were two wealthy investment bankers and longtime friends: Ferdinand Eberstadt and James Forrestal. Together they played integral roles in the massive war mobilization program and, later, in the formation of institutions for postwar national security.Jeffery M. Dorwart's research and analysis provide a fresh look at the friendships, connections, and mindsets that steered the growing federal government in the first half of the twentieth century. The result of these relationships was a system of corporatist management for wartime mobilization and for Cold War national security. Eberstadt, a key figure on numerous policy committees, and Forrestal, secretary of the navy during the 1940s and the first secretary of the new Department of Defense, shared a common background all the way to their college days at Princeton. Over the years, their friendship and their ties to a group of like-minded executives, whom Eberstadt termed the "Good Men," substantially shaped government policy.Dorwart's research on Eberstadt's role is especially enlightening, for it reveals how Eberstadt, an outside consultant and not a government employee or elected official, affected policy direction through his design of the National Security Act of 1947."This is a significant contribution to American military and defense history. The author's use of the `Good Man' idea effectively . . . illustrates how non-military ideas and influences have been fundamental in shaping national security policy."--Jerry Cooper, University of Missouri-St. Louis (formerly of the Command and General Staff College)
-
Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond (4th Edition)
Vendor: Abebooks.com Price: 94.22 $The Definitive Guide to Building Firewalls with Linux As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security. An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more. Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise. Inside, you’ll find just what you need to Install, configure, and update a Linux firewall running either iptables or nftables Migrate to nftables, or take advantage of the latest iptables enhancements Manage complex multiple firewall configurations Create, debug, and optimize firewall rules Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions Harden systems against port scanning and other attacks Uncover exploits such as rootkits and backdoors with chkrootkit
-
Sap System Security Guide (sap Press) [first edition]
Vendor: Abebooks.com Price: 37.99 $If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Then get the technical know-how to identify vulnerabilities, defend your system from internal and external threats, and pass audits. Secure your SAP system from the ground up! * Configure application, network, and infrastructure security * Set up identity and access management: roles, authorizations, SSO * Strengthen the security of SAP NetWeaver systems, including SAP S/4HANA, SAP Business Suite, SAP Fiori, and more Security Basics Define system log on and password rules, secure transactions and clients, and learn to use the Common Cryptographic Library. User Management Learn to create users, define roles, and implement authorizations and authentication to ensure the right people have the right access in your system. External Security Make sure your system's database and infrastructure are protected from unauthorized external access using encryption, the Internet Connection Manager (ICM), the SAP Virus Scan Interface, firewalls, and more. * Transaction locks * CommonCryptoLib * Single sign-on (SSO) * Authorizations * Transport security * Audit logging * Patching * Client locking * Secure communication * Database security
-
Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools
Vendor: Abebooks.com Price: 29.68 $Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe-in fact impenetrable-from malicious code, buffer overflows, stealth port scans, Smb probes, Os fingerprinting attempts, Cgi attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, Snort, the most commonly used Open Source Intrusion Detection System, (Ids) has begun to eclipse many expensive proprietary Idses. In terms of documentation or ease of use, however, Snort can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you? Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and Ids Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and Ids Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated Ids (Intrusion Detection Systems) applications and the Gui interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional
32 results in 0.25 seconds
Related search terms
© Copyright 2024 shopping.eu