Amazon cover image
Image from Amazon.com

Network performance and security : testing and analyzing using open source and low-cost tools Chris Chapman, Steve Furnell, technical editor

By: Contributor(s): Material type: TextTextPublication details: Amsterdam : Elsevier Ltd., c2016.Description: xiv, 366 p. : ill. ; 24 cmISBN:
  • 9780128035849
Subject(s): DDC classification:
  • 005.8 CH NE
Online resources: Summary: Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
REGULAR University of Wollongong in Dubai Main Collection 005.8 CH NE (Browse shelf(Opens below)) Available T0055039

Includes index.

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access.

There are no comments on this title.

to post a comment.