MCGRAW-HILL / INTERAMERICANA DE ESPAÑA, S.A. 9788448138080
La referencia de seguridad esencial que necesitan los adiministradores de sistemas Windows para implementar la seguridad para los sistemas operativos, servidores, clientes, servicios de intranet e Internet de Microsoft Windows, escrita por el equipo de seguridad de Microsoft. Este KIT DE RECURSOS oficial de Microsoft proporciona a los profesionales de las TI información completa acerca de las operaciones y la implantación, además de herramientas esenciales con las que pueden trabajar los profesionales de la seguridad. Los autores -miembros de los equipos de seguridad de Microsoft- describen cómo planificar e implementar una estrategia de seguridad amplia, evaluar amenazas y vulnerabilidades de la seguridad, configurar la seguridad del sistema, salvaguardar los datos, monitorizar y detectar eventos de seguridad, responder a ataques internos y externos, y aplicar de forma eficaz tecnologías de seguridad y prácticas correctas. El KIT DE RECURSOS también proporciona herramientas de seguridad imprescindibles, listas de comprobación, plantillas y otros recursos en el CD-ROM y en la Web.
Don't wait for an attacker to find and exploit your security vulnerabilities-take the lead by assessing the state of your network's security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features time-saving tools and scripts that you can use to reveal and help correct security vulnerabilities in your own network. Sharpen and advance your security assessment skills, including how to: *Detect vulnerabilities and perform penetration tests *Conduct and properly report an IT security audit *Find hidden hosts by using DNS, WINS, and NetBIOS *Sweep your network to analyze network topology, existing hosts, and multi-homed systems *Determine the status of ICP and UDP ports by using port scanning Recognize and help counter common network threats, including: *War dialing, war driving, and Bluetooth attacks *Packet and network sniffing *IP, e-mail, and DNS spoofing *Password cracking *Communication interceptions and modifications *IDS and IPS attacker detection avoidance *Spam and other e-mail abuses CD features: *Tools for testing e-mail, databases, and Web servers *Scripts for finding common information leaks and other potential security issues *Complete eBook in PDF format
The Road meets Waiting for Godot: powerful, unforgettable, unique Melissa Harrison, author of At Hawthorn Time.Doggerland is a superbly gripping debut novel about loneliness and hope, nature and survival set on an off-shore windfarm in the not-so-distant future.His fathers breath had been loud in the small room. It had smelled smoky, or maybe more like dust. Ill get out, hed said. Ill come back for you, ok The boy remembered that; had always remembered it. And, for a time, hed believed it too.In the North Sea, far from what remains of the coastline, a wind farm stretches for thousands of acres.The Boy, who is no longer really a boy, and the Old Man, whose age is unguessable, are charged with its maintenance. They carry out their never-ending work as the waves roll, dragging strange shoals of flotsam through the turbine fields. Land is only a memory.So too is the Boys father, who worked on the turbines before him, and disappeared.The boy has been sent by the Company to take his place, but the question of where he went and why is one for which the Old Man will give no answer.As the Old Man dredges the sea for lost things, the Boy sifts for the truth of his missing father. Until one day, from the limitless water, a plan for escape emergesDoggerland is a haunting and beautifully compelling story of loneliness and hope, nature and survival.