Endpoint Security by Mark Kadrich (2007, Perfect)

ThriftBooks (3898583)
99% positive feedback
Price:
US $20.44
ApproximatelyPHP 1,134.36
+ $16.12 shipping
Estimated delivery Tue, 1 Jul - Tue, 29 Jul
Returns:
No returns, but backed by .
Condition:
Very Good

About this product

Product Identifiers

PublisherAddison Wesley Professional
ISBN-100321436954
ISBN-139780321436955
eBay Product ID (ePID)57044794

Product Key Features

Number of Pages384 Pages
Publication NameEndpoint Security
LanguageEnglish
Publication Year2007
SubjectNetworking / Vendor Specific, Security / Networking
TypeTextbook
AuthorMark Kadrich
Subject AreaComputers
FormatPerfect

Dimensions

Item Height0.9 in
Item Weight25.6 Oz
Item Length9.2 in
Item Width7 in

Additional Product Features

Intended AudienceScholarly & Professional
LCCN2006-102875
Dewey Edition22
IllustratedYes
Dewey Decimal005.8
Table Of ContentForeword Preface About the Author Chapter 1 Defining Endpoints Chapter 2 Why Security Fails Chapter 3 Something Is Missing Chapter 4 Missing Link Discovered Chapter 5 Endpoints and Network Integration Chapter 6 Trustworthy Beginnings Chapter 7 Threat Vectors Chapter 8 Microsoft Windows Chapter 9 Apple OS X Chapter 10 Linux Chapter 11PDAs and Smartphones Chapter 12 Embedded Devices Chapter 13 Case Studies of Endpoint Security Failures Glossary Index
Synopsis<> A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today''s newest threats, and prepare yourself for tomorrow''s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich''s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You''ll learn how to: * Recognize dangerous limitations in conventional endpoint security strategies * Identify the best products, tools, and processes to secure your specific devices and infrastructure * Configure new endpoints securely and reconfigure existing endpoints to optimize security * Rapidly identify and remediate compromised endpoint devices * Systematically defend against new endpoint-focused malware and viruses * Improve security at the point of integration between endpoints and your network Whether you''re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you''ve been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec''s Senior Manager of Network and Endpoint Security. His 20 years'' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defining Endpoints Chapter 2 Why Security Fails Chapter 3 Something Is Missing Chapter 4 Missing Link Discovered Chapter 5 Endpoints and Network Integration Chapter 6 Trustworthy Beginnings Chapter 7 Threat Vectors Chapter 8 Microsoft Windows Chapter 9 Apple OS X Chapter 10 Linux Chapter 11 PDAs and Smartphones Chapter 12 Embedded Devices Chapter 13 Case Studies of Endpoint Security Failures Glossary Index, A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You'll learn how to: - Recognize dangerous limitations in conventional endpoint security strategies - Identify the best products, tools, and processes to secure your specific devices and infrastructure - Configure new endpoints securely and reconfigure existing endpoints to optimize security - Rapidly identify and remediate compromised endpoint devices - Systematically defend against new endpoint-focused malware and viruses - Improve security at the point of integration between endpoints and your network Whether you're a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you've been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec's Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defining Endpoints Chapter 2 Why Security Fails Chapter 3 Something Is Missing Chapter 4 Missing Link Discovered Chapter 5 Endpoints and Network Integration Chapter 6 Trustworthy Beginnings Chapter 7 Threat Vectors Chapter 8 Microsoft Windows Chapter 9 Apple OS X Chapter 10 Linux Chapter 11 PDAs and Smartphones Chapter 12 Embedded Devices Chapter 13 Case Studies of Endpoint Security Failures Glossary Index, <> A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You'll learn how to: · Recognize dangerous limitations in conventional endpoint security strategies · Identify the best products, tools, and processes to secure your specific devices and infrastructure · Configure new endpoints securely and reconfigure existing endpoints to optimize security · Rapidly identify and remediate compromised endpoint devices · Systematically defend against new endpoint-focused malware and viruses · Improve security at the point of integration between endpoints and your network Whether you're a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you've been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec's Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defining Endpoints Chapter 2 Why Security Fails Chapter 3 Something Is Missing Chapter 4 Missing Link Discovered Chapter 5 Endpoints and Network Integration Chapter 6 Trustworthy Beginnings Chapter 7 Threat Vectors Chapter 8 Microsoft Windows Chapter 9 Apple OS X Chapter 10 Linux Chapter 11 PDAs and Smartphones Chapter 12 Embedded Devices Chapter 13 Case Studies of Endpoint Security Failures Glossary Index, A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today' s newest threats, and prepare yourself for tomorrow' s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to " trusted computing." Unlike traditional " one-size-fits-all" solutions, Kadrich' s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You' ll learn how to: - Recognize dangerous limitations in conventional endpoint security strategies - Identify the best products, tools, and processes to secure your specific devices and infrastructure - Configure new endpoints securely and reconfigure existing endpoints to optimize security - Rapidly identify and remediate compromised endpoint devices - Systematically defend against new endpoint-focusedmalware and viruses - Improve security at the point of integration between endpoints and your network Whether you' re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you' ve been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec' s Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defining Endpoints Chapter 2 Why Security Fails Chapter 3 Something Is Missing Chapter 4 Missing Link Discovered Chapter 5Endpoints and Network Integration Chapter 6 Trustworthy Beginnings Chapter 7 Threat Vectors Chapter 8 Microsoft Windows Chapter 9 Apple OS X Chapter 10 Linux Chapter 11 PDAs and Smartphones Chapter 12 Embedded Devices Chapter 13 Case Studies of Endpoint Security Failures Glossary Index, A Comprehensive, Proven Approach to Securing All Your Network Endpoints Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You'll learn how to: - Recognize dangerous limitations in conventional endpoint security strategies - Identify the best products, tools, and processes to secure your specific devices and infrastructure - Configure new endpoints securely and reconfigure existing endpoints to optimize security - Rapidly identify and remediate compromised endpoint devices - Systematically defend against new endpoint-focused malware and viruses - Improve security at the point of integration between endpoints and your network Whether you're a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you've been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec's Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defining Endpoints Chapter 2 Why Security Fails Chapter 3 Something Is Missing Chapter 4 Missing Link Discovered Chapter 5 Endpoints and Network Integration Chapter 6 Trustworthy Beginnings Chapter 7 Threat Vectors Chapter 8 Microsoft Windows Chapter 9 Apple OS X Chapter 10 Linux Chapter 11 PDAs and Smartphones Chapter 12 Embedded Devices Chapter 13 Case Studies of Endpoint Security Failures Glossary Index, A leading security expert introduces a breakthrough strategy to protecting "all" endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against todays newest threats, and how to prepare for tomorrows.
No ratings or reviews yet
Be the first to write a review