Security. Protection against viruses and hackers. Security through its own registry.

Pay with:
i agree with "Terms for Customers"
Sold: 2
Refunds: 0

Uploaded: 04.08.2004
Content: 40804031540493.______________________.exe (374,77 kB)



Introduction to the Internet and security therein
1.1. Internet
1.2 Overview of the internal structure of TCP / IP
1.3 Issues related to security
1.4 How vulnerable are your organization's network to the Internet?
Introducing firewalls
2.1 The concept of a firewall
2.2 Why Firewalls?
2.3 Problems arising from the firewall
2.4 Components of the Firewall
Combining parts into a unified whole - examples firewalls
3.1 Firewall packet filtering
3.2 based firewall machine that is connected to two networks
3.3 Firewall with isolated host
3.4 Firewall with isolated subnet
3.5 The integration of modem pools with firewalls
Next steps
4.1 Firewall Policy
4.2 Acquisition of a firewall
4.3 Organizational issues with firewalls
Appendix. Online information resources
-------------------------------------------------- -
1.Potentsialnye location Trojans
2.Ochistka paging file when you restart
3.Ustranenie permission errors in the list of system DLL
4.Zapret restart and shutdown your computer without the log on locally
5.Ogranichenie access to view event logs users group Guest
6. Changes event log file location on the hard disk
7.Dopolnitelnaya protection of local input
8. "Hiding" the server in the list of network environment (Network Neightborhood)
9.Snyatie passwords and screen savers
and much more ...
-------------------------------------------------- -
1.1. Purpose
1.2. For whom this book
1.3. Internet basics
1.4. Why develop a security policy for the Internet?
1.5. The main types of policies
2. General principles
2.1. That there should be
2.2. Obtaining permission
2.3. Policy Implemented
2.4. Examples describe the general principles of the Internet in politics
3.Analiz risk
3.1. Threats / Visibility
3.2. Vulnerability / consequences
3.3. Matrix Profile
3.4. Accounting information assets
3.5. General Purpose
3.6. Critical applications
3.7. Data classification
4. Commercial Requirements
4.1. Remote access
4.2. Dial-up connection
4.3. Telnet / X Windows
4.4. Laptops
4.5. Email
4.6. Publication of information
4.7. Research
4.8. Electronic commerce
4.9. Electronic data interchange
4.10. Transaction Information
4.11. Financial Transactions
4.12. Always available to interact
4.13. Ease of use
4.14. One-time registration
4.15. User Interface Design
5. Examples of areas which require policy
5.1. Identification and authentication
5.2. Import control programs
5.3. Encryption
5.4. System Architecture
5.5. Resolving security incidents
5.6. Organisational measures
5.7. User Training
6. The firewall policy
6.1. Fundamentals and purpose
6.2. Authentication
6.3. Analysis of the possibilities of routing and proxy servers
6.4. Types of Firewalls
6.5. Firewall Architecture
6.6. Intranet
6.7. Administration Firewall
6.8. Network Trust Relationships
6.9. Virtual private networks (VPN)
6.10. Display names in the address using DNS
6.11. System Integrity
6.12. Documentation
6.13. Physical security firewall
6.14. Action on security breach attempts
6.15. Recovery services
6.16. Improved Firewall
6.17. Review of security policy for the firewall
6.18. System logs (event messages and final reports)
6.19. Examples of policies
6.20. Examples of specific policies for individual services
6.21. Head of department
6.22. Employees of the department of automation
7. World Wide Web - World Wide Web (WWW)
7.1. Finding information on the Internet using a browser
7.2. Examples of policies for information retrieval
7.3. The web server


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)