A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against todayas newest threats, and prepare yourself for tomorrowas attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to atrusted computing.a Unlike traditional aone-size-fits-alla solutions, Kadrichas approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. Youall learn how to: ac Recognize dangerous limitations in conventional endpoint security strategies ac Identify the best products, tools, and processes to secure your specific devices and infrastructure ac Configure new endpoints securely and reconfigure existing endpoints to optimize security ac Rapidly identify and remediate compromised endpoint devices ac Systematically defend against new endpoint-focused malware and viruses ac Improve security at the point of integration between endpoints and your network Whether youare a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what youave been searching for: a comprehensive endpoint security strategy that works.HFS Hierarchical File System used in the Mac OS X operating system. HI Host integrity. A function used to determine whether a ... IPM Intellectual property management or rights management. IRIX A System V-based UNIX with BSD extensionsanbsp;...
|Publisher||:||Addison-Wesley Professional - 2007-03-30|