|
|||||||||||||
Crash Course - Routers
Need a quick knowledge fix on routers? This week we present technical tips and advice on router basics, so you can get your hardware up and configured in no time.
Chapter of the Week - Security best practices
The Tao of Network Security Monitoring, Beyond Intrusion Detection, Chapter 11 by Richard Bejtlich presents best practices for assessment, protection, detection, and response, as far as network security monitoring (NSM) is concerned. While elements of NSM best practices appear throughout the book, this chapter focuses exclusively on the mind-set needed to conduct NSM operations. (Reproduced from The Tao of Network Security Monitoring, Beyond Intrusion Detection, ISBN 0321246772, Copyright 2005 with permission from Pearson publishing as Addison-Wesley Professional.)
News Exclusive: Rendition adds compliance to network management
In addition to new SecurID support, Rendition Networks' configuration management software now helps with Sarbanes-Oxley compliance by ensuring that financial data stays secure.
MORE INFO:
> Learn why third-party device management is drawing a crowd
> Read our exclusive: Gold Wire mends Staples' management woes
|
|
||||||||||
This e-newsletter is published by TechTarget, the most targeted IT media and events company. Copyright 2004 TechTarget. All rights reserved. To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://searchTechTarget.techtarget.com/u?cid=495891&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.
Contact Us: |
||||