Endpoint Security

Nonfiction, Computers, Networking & Communications
Cover of the book Endpoint Security by Mark Kadrich, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Kadrich ISBN: 9780132797627
Publisher: Pearson Education Publication: March 30, 2007
Imprint: Addison-Wesley Professional Language: English
Author: Mark Kadrich
ISBN: 9780132797627
Publisher: Pearson Education
Publication: March 30, 2007
Imprint: Addison-Wesley Professional
Language: English

A Comprehensive, Proven Approach to Securing All Your Network Endpoints!

 

Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones.

 

Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare yourself for tomorrow’s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to “trusted computing.”

 

Unlike traditional “one-size-fits-all” solutions, Kadrich’s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more.

 

You’ll learn how to:

 •  Recognize dangerous limitations in conventional

endpoint security strategies

 •  Identify the best products, tools, and processes to secure your specific devices and infrastructure

 •  Configure new endpoints securely and reconfigure existing endpoints to optimize security

 •  Rapidly identify and remediate compromised

endpoint devices

 •  Systematically defend against new endpoint-focused malware and viruses

 •  Improve security at the point of integration between endpoints and your network

 

 Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for:

a comprehensive endpoint security strategy that works.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A Comprehensive, Proven Approach to Securing All Your Network Endpoints!

 

Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones.

 

Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare yourself for tomorrow’s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to “trusted computing.”

 

Unlike traditional “one-size-fits-all” solutions, Kadrich’s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more.

 

You’ll learn how to:

 •  Recognize dangerous limitations in conventional

endpoint security strategies

 •  Identify the best products, tools, and processes to secure your specific devices and infrastructure

 •  Configure new endpoints securely and reconfigure existing endpoints to optimize security

 •  Rapidly identify and remediate compromised

endpoint devices

 •  Systematically defend against new endpoint-focused malware and viruses

 •  Improve security at the point of integration between endpoints and your network

 

 Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for:

a comprehensive endpoint security strategy that works.

More books from Pearson Education

Cover of the book Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Mark Kadrich
Cover of the book Microsoft OneNote 2013 Plain & Simple by Mark Kadrich
Cover of the book The Object-Oriented Thought Process by Mark Kadrich
Cover of the book Easy OS X Mavericks by Mark Kadrich
Cover of the book Analysis, Synthesis and Design of Chemical Processes by Mark Kadrich
Cover of the book Networking with Microsoft Windows Vista by Mark Kadrich
Cover of the book Sams Teach Yourself SQL in 10 Minutes by Mark Kadrich
Cover of the book Process for System Architecture and Requirements Engineering by Mark Kadrich
Cover of the book CCNP Wireless IAUWS Quick Reference by Mark Kadrich
Cover of the book Algorithms in C++ Part 5 by Mark Kadrich
Cover of the book The Adobe Photoshop CS3 Book for Digital Photographers by Mark Kadrich
Cover of the book Linux Kernel Development by Mark Kadrich
Cover of the book F. Scott Barker's Microsoft Access 2002 Power Programming by Mark Kadrich
Cover of the book The Truth About Search Engine Optimization by Mark Kadrich
Cover of the book My iPad for Seniors (covers iOS 7 on iPad Air, iPad 3rd and 4th generation, iPad2, and iPad mini) by Mark Kadrich
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy