Network Security BibleJohn Wiley & Sons, 31 mar 2011 - 944 páginas The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.
If you need to get up to date or stay current on network security, Network Security Bible, 2nd Edition covers everything you need to know. |
Índice
| 3 | |
| 9 | |
| 19 | |
| 33 | |
| 35 | |
Risk Management | 60 |
Calculating and Managing Risk | 70 |
AccessControl | 109 |
Detailed DNS Architecture | 388 |
ServerSecurity | 395 |
Summary | 427 |
Network Protocols | 431 |
The Data Link layer | 437 |
VoIP | 450 |
Summary | 457 |
Summary | 529 |
Mandatory access control | 111 |
Databases | 121 |
AttacksandThreats | 127 |
War driving | 136 |
Summary | 142 |
Firewall | 177 |
Configuration control | 182 |
Upgrades and Patches | 191 |
Summary | 205 |
Controlling the Configuration | 217 |
Operating UNIX Safely | 224 |
Hardening UNIX | 245 |
Summary | 253 |
Netscapespecific issues | 281 |
WebSecurity | 287 |
Electronic mail Email Security | 323 |
Simple email vs collaboration | 324 |
Spam | 335 |
Email Authentication | 345 |
Summary | 355 |
CovertCommunication | 631 |
Comparison to other technologies | 637 |
Principles of Steganography | 643 |
Products That Implement Steganography | 654 |
Steganography Versus Digital Watermarking | 673 |
Summary | 679 |
Summary | 704 |
Summary | 727 |
Security Assessments Testing and Evaluation | 751 |
NSA Infosec Assessment Methodology | 754 |
DIACAP | 760 |
Penetration Testing | 770 |
ValidatingYourSecurity | 777 |
Exploiting the system | 790 |
DataProtection | 797 |
PuttingEverythingTogether Critical Problems Facing Organizations 809 | 809 |
Apply and test patches | 818 |
TheFuture | 835 |
| 849 | |
Otras ediciones - Ver todo
Network Security Bible Eric Cole,Ronald L. Krutz,James W. Conley No hay ninguna vista previa disponible - 2005 |
Network Security Bible Eric Cole,Ronald L. Krutz,James Conley No hay ninguna vista previa disponible - 2005 |
Términos y frases comunes
access control activities administrator analysis antivirus attacks audit authentication backup biometric browser buffer overflow business continuity planning changes Chapter client components Computer security configuration management cookies critical database Defense-in-Depth disaster recovery plan document Domain Name Domain Name System e-mail encrypted ensure example exploit firewall functions hardware host identify implementation information protection information security Information System Security installation integrity Internet IP address iptables Kerberos Microsoft mitigation monitoring needs network security operating system organization organization’s packets password performance personnel POP3 port prevent Principles and Practices procedures protocols response risk assessment risk management scanning SDLC security awareness security controls security policy sensitive session specific System Security Management System Security Principles Systems and Applications systems engineering systems security engineer target technical test and evaluation threat types UNIX user’s virus viruses vulnerability Web browser Web server Windows workstation
