Network performance and security :
Chapman, Chris
Network performance and security : testing and analyzing using open source and low-cost tools Chris Chapman, Steve Furnell, technical editor - Amsterdam : Elsevier Ltd., c2016. - xiv, 366 p. : ill. ; 24 cm.
Includes index.
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access.
9780128035849
Computer networks--Security measures
Telecommunication systems--Security measures
COMPUTERS / Security / Networking
005.8 CH NE
Network performance and security : testing and analyzing using open source and low-cost tools Chris Chapman, Steve Furnell, technical editor - Amsterdam : Elsevier Ltd., c2016. - xiv, 366 p. : ill. ; 24 cm.
Includes index.
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access.
9780128035849
Computer networks--Security measures
Telecommunication systems--Security measures
COMPUTERS / Security / Networking
005.8 CH NE