Article

Chapter of the Week - February 2005

Kara Gattine, Associate Editor
Networking chapter of the week- 2/05

    Requires Free Membership to View



SearchNetworking.com Chapter of the Week

This month we present you with chapter excerpts focusing on network security.
Check out this week's featured chapter :

You can download this week's chapter now. Be sure to bookmark this Chapter of the Week page and check back each week to access our upcoming chapters.

Previous features:

  • Feb. 1-5 The Business Case for Network Security, Chapter 5
  • Feb. 7-11 Anti Spam Tool Kit, Chapter 16
  • Feb. 14–18 Network Security: The Complete Reference, Chapter 10

    Windows XP Professional Network Administration, Chapter 9
    Featured Feb. 21-25
    Network security

    Chapter 9 of 'Windows XP Professional Network Administration' by Robert Elsenpeter and Toby J. Velte examines how security must be managed on two fronts: at the local computer level and at the network level. This chapter examines both areas, first with a discussion of Windows XP Professional, and then with a discussion of server security. (Reproduced from the book 'Windows XP Professional Network Administration,' ISBN 0072225041, Copyright 2005, The McGraw-Hill Companies. Reproduced by permission of McGraw-Hill Professional, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)

    Download " Windows XP Professional Network Administration, Chapter 9" here.



    Network Security: The Complete Reference, Chapter 10
    Featured Feb. 14-18
    Network device security

    Chapter 10 of Network security: The complete reference by Mark Rhodes-Ousley, Roberta Bragg and Keith Strassberg focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. (Reproduced from the book Network security: The complete reference, ISBN 0072226978, Copyright 2005, McGraw-Hill Companies, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)
    Download "Network Security: The Complete Reference - Chapter 10" here.



    Anti Spam Tool Kit, Chapter 16
    Fighting spam defensively

    Featured February 7-11

    Chapter 16 of the Anti Spam Tool Kit focuses on defending against unwanted e-mail. You'll learn about specific network and IT management strategies that reduce the threat spam poses to your organization. (Reproduced from the book Anti Spam Took Kit, ISBN 007223167X , Copyright 2004, McGraw-Hill Companies. Reproduced by permission of McGraw-Hill, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)

    Download Anti Spam Tool Kit, Chapter 16 here.



    The Business Case for Network Security, Chapter 5
    Policy, Personnel, and Equipment as Security Enablers

    Featured February 1-5

    Chapter 5 of The Business Case for Network Security by Catherine Paquet and Warren Saxe explores key areas that policies should address, from equipment utilization and employee awareness programs to querying senior management on internal best practices. Most importantly, it can serve as a benchmark for ascertaining an organization's current security posture. (Reproduced from the book The Business Case for Network Security, ISBN 1587201216, Copyright 2005, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)

    Download The Business Case for Network Security , Chapter 5 here.


  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: