Network Security Bible~tqw~ darksidergseeders: 1
leechers: 0
Network Security Bible~tqw~ darksiderg (Size: 12.87 MB)
Description
*******************************************************************************
Network Security Bible ******************************************************************************* General InformationType.................: Ebooks Part Size............: 13,487,933 bytes Post InformationPosted by............: ~tqw~ Release NotesIntended for the novice professional, this guide introduces the basic principles and access control concepts needed to secure Windows and Unix operating systems, web browsers, e-mail systems, and servers. It outlines the OSI and TCP network protocol models, describes the standard components of a network, recommends best practices for secret and covert communications, and explores the fundamentals of intrusion detection and information security assessment methods. * A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security * Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers * Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness Table of Contents Pt. I Security principles and practices 1 Ch. 1 Information system security principles 3 Ch. 2 Information system security management 43 Ch. 3 Access control considerations 79 Pt. II Operating systems and applications 97 Ch. 4 Windows security 99 Ch. 5 UNIX and Linux security 155 Ch. 6 Web browser and client security 201 Ch. 7 Web security 237 Ch. 8 E-mail security 273 Ch. 9 Domain name system 309 Ch. 10 Server security 333 Pt. III Network security fundamentals 365 Ch. 11 Network protocols 367 Ch. 12 Wireless security 381 Ch. 13 Network architecture fundamentals 417 Pt. IV Communications 445 Ch. 14 Secret communication 447 Ch. 15 Covert communication 479 Ch. 16 Applications of secure/covert communication 529 Pt. V The security threat and the response 555 Ch. 17 Intrusion detection and response 557 Ch. 18 Security assessments, testing, and evaluation 591 Ch. 19 Putting everything together 613 Product Details * ISBN: 0764573977 * ISBN-13: 9780764573972 * Format: Paperback, 694pp * Publisher: Wiley, John & Sons, Incorporated * Pub. Date: December 2004 Install NotesAdobe Acrobat Reader Sharing Widget |