Network Performance and Security
12%
off

Network Performance and Security : Testing and Analyzing Using Open Source and Low-Cost Tools

Free delivery worldwide

Available. Dispatched from the UK in 4 business days
When will my order arrive?

Description

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets-such as servers, switches, hypervisor hosts, routers, and firewalls-using publicly available tools for network inventory.



The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.

Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
show more

Product details

  • Paperback | 380 pages
  • 191 x 235 x 20.07mm | 770g
  • Rockland, MA, United States
  • English
  • 0128035846
  • 9780128035849

Table of contents

Introduction: Practical Security and Performance Testing

Ch. 1: Getting organized: Asset Inventory; knowing what you have

Ch. 2: Locking down Access: Internet, Wi-Fi, Wired Zones, and VPN

Ch. 3: Securing BYOD device access

Ch. 4: Hardening the Server

Ch. 5: Internal Security Threats and defending assets and zones

Ch. 6: How to test the Firewall and IPS/IDS Effectively

Ch. 7: Security Device Deployment Patterns

Ch. 8: Continuous Testing

Ch. 9: Defending against penetration attacks

Ch. 10: How to write and test a Request for Proposal

Ch. 11: Security "Fire drills"

Glossary
show more

About Professor Chris Chapman Dr

Chris Chapman is Senior Methodologist for Spirent Communications, a global leader in network design and development. Chris has more than 20 years of experience with multiprotocol and cloud networking technologies. He writes industry-leading tests and test methodologies for major service providers, network equipment manufacturers, and standards bodies, and he is an active blogger for InformationWeek and other publications. Previously Chris held key engineering positions at Apple, Netscape, CompuServe, and MCI.
show more