Description |
xxxiv, 660 pages : illustrations ; 24 cm |
Contents |
Contents: Pt. I. Security principles and practices -- Ch. 1. Information system security principles -- Ch. 2. Information system security management -- Ch. 3. Access control considerations -- Pt. II. Operating systems and applications -- Ch. 4. Windows security -- Ch. 5. UNIX and Linux security -- Ch. 6. Web browser and client security -- Ch. 7. Web security -- Ch. 8. E-mail security -- Ch. 9. Domain name system -- Ch. 10. Server security -- Pt. III. Network security fundamentals -- Ch. 11. Network protocols -- Ch. 12. Wireless security -- Ch. 13. Network architecture fundamentals -- Pt. IV. Communications -- Ch. 14. Secret communication -- Ch. 15. Covert communication -- Ch. 16. Applications of secure/covert communication -- Pt. V. The security threat and the response -- Ch. 17. Intrusion detection and response -- Ch. 18. Security assessments, testing, and evaluation -- Ch. 19. Putting everything together |
Summary |
Summary: "Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how to evaluate your security. You'll even get guidance in making the case for enhanced security to leaders of the organization. Whether you're learning the basics or seeking more detailed knowledge, you'll find this reference invaluable."--BOOK JACKET |
Notes |
Includes index |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
Author |
Krutz, Ronald L., 1938-
|
|
Conley, James W.
|
LC no. |
2004025696 |
ISBN |
0764573977 paperback |
|