Description |
xxx, 593 pages : illustrations ; 24 cm |
Contents |
Machine derived contents note: Part I: Do This Now! -- Chapter 1: Do These 7 Things Before You Do Anything Else -- Part II: Take it From the Top. Systematically Hardening Your Enterprise -- Chapter 2: Break the Network into Areas of Common Functionality -- Chapter 3: Hardening with Identity Management Systems -- Chapter 4: Hardening Cross Platform Authentication -- Chapter 5: Implement Secure Centralized Authentication Mechanisms -- Chapter 6: Mobile Authentication Considerations -- Chapter 7: Beyond Access Controls - Protecting Stored Data -- Chapter 8: Hardening Database Access -- Chapter 9: Hardening Cross Platform Access Controls -- Chapter 10: Hardening Data Transport Using Encryption -- Chapter 11: Hardening Remote Clients (Windows, Mac, nix) -- Chapter 12: Hardening Wireless -- Chapter 13: Hardening a Mixed Unix Network -- Chapter 14: Intrusion Detection and Response -- Chapter 15: Managing Malicious Code -- Chapter 16: Hardening Wetware -- Part III: Once is Never Enough -- Chapter 17: Auditing and Testing Security -- Chapter 18: Change Management -- Chapter 19: Security Patching -- Chapter 20: Security Review -- Part IV: How to Succeed at Hardening -- Chapter 21: Politics of Security Management -- Chapter 22: Security Agnostics |
Notes |
Includes index |
Subject |
Computer networks -- Security measures.
|
Author |
Mallery, John.
|
LC no. |
2005298992 |
ISBN |
0072257032 paperback |
|