Network Security BibleJohn Wiley & Sons, 20 dic 2004 - 694 páginas
|
Índice
Part I Security Principles and Practices | 1 |
Part II Operating Systems and Applications | 97 |
Part III Network Security Fundamentals | 365 |
Part IV Communications | 445 |
Part V The Security Threat and the Response | 555 |
625 | |
Otras ediciones - Ver todo
Network Security Bible Eric Cole,Ronald L. Krutz,James Conley No hay ninguna vista previa disponible - 2005 |
Términos y frases comunes
access control ActiveX activity administrator algorithm application assessment attack authentication backup bits browser certificate Chapter cipher text client communication configuration cookies cryptography database decrypt digital signature digital watermarking document domain name downloaded e-mail encryption ensure example Figure firewall functions hash hide honeypot host IDSs implementation information system security installed integrity Internet intrusion detection IP address layer mail server man-in-the-middle attack monitoring network security operating system organization packet password plain text POP3 port procedures protection protocol public key query request requirements response risk runlevel scripts secret key security controls security engineer session signatures SMTP steganography stego stream cipher techniques tion traffic transmitted types UNIX user’s virus viruses vulnerabilities watermark Web browser Web server Windows workstation wireless workstation