29,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
15 °P sammeln
  • Broschiertes Buch

The use of a good security policy and the implementation of different protection mechanisms against different attacks have become, for a few years, essential solutions to network security. In this end-of-study project, we studied the case of the GEC'S firm's computer park and we adopted an architecture that meets its needs. A software of management of the park GLPI as well as various servers were installed namely the Web server LMAP, the file servers SAMBA and NFS, the FTP server and the DHCP server. This architecture is secured by the implementation of a firewall, a Proxy server and an SSH server.…mehr

Produktbeschreibung
The use of a good security policy and the implementation of different protection mechanisms against different attacks have become, for a few years, essential solutions to network security. In this end-of-study project, we studied the case of the GEC'S firm's computer park and we adopted an architecture that meets its needs. A software of management of the park GLPI as well as various servers were installed namely the Web server LMAP, the file servers SAMBA and NFS, the FTP server and the DHCP server. This architecture is secured by the implementation of a firewall, a Proxy server and an SSH server.
Autorenporträt
AMAL HAMMAMIEspecialista em novas tecnologias.Apaixonado pela engenharia QOS dos sistemas de telecomunicações e pela análise de dados.