Home > Store > Security > Network Security

Endpoint Security

Endpoint Security

eBook (Watermarked)

  • Your Price: $41.59
  • List Price: $51.99
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2007
  • Dimensions: 7" x 9-1/4"
  • Pages: 384
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-280069-1
  • ISBN-13: 978-0-13-280069-3

<>

A Comprehensive, Proven Approach to Securing All Your Network Endpoints!

Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones.

Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare yourself for tomorrow’s attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to “trusted computing.”

Unlike traditional “one-size-fits-all” solutions, Kadrich’s approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more.

You’ll learn how to:

 •  Recognize dangerous limitations in conventional

endpoint security strategies

 •  Identify the best products, tools, and processes to secure your specific devices and infrastructure

 •  Configure new endpoints securely and reconfigure existing endpoints to optimize security

 •  Rapidly identify and remediate compromised

endpoint devices

 •  Systematically defend against new endpoint-focused malware and viruses

 •  Improve security at the point of integration between endpoints and your network

Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for:

a comprehensive endpoint security strategy that works.

Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec’s Senior Manager of Network and Endpoint Security.

His 20 years’ IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues.

 
 Foreword         

 Preface

 About the Author          

Chapter 1          Defining Endpoints        

Chapter 2          Why Security Fails       

Chapter 3          Something Is Missing   

Chapter 4          Missing Link Discovered

Chapter 5          Endpoints and Network Integration          

Chapter 6          Trustworthy Beginnings 

Chapter 7          Threat Vectors  

Chapter 8          Microsoft Windows        

Chapter 9          Apple OS X      

Chapter 10        Linux   

Chapter 11        PDAs and Smartphones

Chapter 12        Embedded Devices     

Chapter 13        Case Studies of Endpoint Security Failures        

Glossary          

Index   

Sample Content

Table of Contents

Foreword

Preface

About the Author

Chapter 1 Defining Endpoints    

Chapter 2 Why Security Fails

Chapter 3 Something Is Missing

Chapter 4 Missing Link Discovered

Chapter 5 Endpoints and Network Integration

Chapter 6 Trustworthy Beginnings

Chapter 7 Threat Vectors

Chapter 8  Microsoft Windows

Chapter 9 Apple OS X

Chapter 10 Linux

Chapter 11PDAs and Smartphones

Chapter 12 Embedded Devices

Chapter 13 Case Studies of Endpoint Security Failures

Glossary 

Index

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership