Network Security Bible

by ; ;
Format: eBook
Pub. Date: 2005-01-01
Publisher(s): WILEY
Availability: This title is currently not available.
List Price: $39.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness

Author Biography

Eric Cole, PhD, has appeared as a security expert on CBS News, 60 Minutes, and CNN Headline News Ronald Krutz, PhD, is the founder of the Carnegie Mellon Research Institute Cybersecurity Center James W. Conley has been a security officer in the United States Navy and a senior security specialist on CIA development efforts

Table of Contents

Acknowledgments.
Introduction.
Part I: Security Principles and Practices.
Chapter 1: Information System Security Principles.
Chapter 2: Information System Security Management.
Chapter 3: Access Control Considerations.
Part II: Operating Systems and Applications.
Chapter 4: Windows Security.
Chapter 5: UNIX and Linux Security.
Chapter 6: Web Browser and Client Security.
Chapter 7: Web Security.
Chapter 8: E-mail Security.
Chapter 9: Domain Name System.
Chapter 10: Server Security.
Part III: Network Security Fundamentals.
Chapter 11: Network Protocols.
Chapter 12: Wireless Security.
Chapter 13: Network Architecture Fundamentals.
Part IV: Communications.
Chapter 14: Secret Communication.
Chapter 15: Covert Communication.
Chapter 16: Applications of Secure/Covert Communication.
Part V: The Security Threat and the Response.
Chapter 17: Intrusion Detection and Response.
Chapter 18: Security Assessments, Testing, and Evaluation.
Chapter 19: Putting Everything Together.
Index.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.