Limit search to available items
Book Cover
Book
Author Cole, Eric.

Title Network security bible / Eric Cole, Ronald Krutz, and James W. Conley
Published Indianapolis, IN : Wiley Pub., [2005]
©2005

Copies

Location Call no. Vol. Availability
 MELB  005.8 Col/Nsb  AVAILABLE
Description xxxiv, 660 pages : illustrations ; 24 cm
Contents Contents: Pt. I. Security principles and practices -- Ch. 1. Information system security principles -- Ch. 2. Information system security management -- Ch. 3. Access control considerations -- Pt. II. Operating systems and applications -- Ch. 4. Windows security -- Ch. 5. UNIX and Linux security -- Ch. 6. Web browser and client security -- Ch. 7. Web security -- Ch. 8. E-mail security -- Ch. 9. Domain name system -- Ch. 10. Server security -- Pt. III. Network security fundamentals -- Ch. 11. Network protocols -- Ch. 12. Wireless security -- Ch. 13. Network architecture fundamentals -- Pt. IV. Communications -- Ch. 14. Secret communication -- Ch. 15. Covert communication -- Ch. 16. Applications of secure/covert communication -- Pt. V. The security threat and the response -- Ch. 17. Intrusion detection and response -- Ch. 18. Security assessments, testing, and evaluation -- Ch. 19. Putting everything together
Summary Summary: "Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how to evaluate your security. You'll even get guidance in making the case for enhanced security to leaders of the organization. Whether you're learning the basics or seeking more detailed knowledge, you'll find this reference invaluable."--BOOK JACKET
Notes Includes index
Subject Computer security.
Computer networks -- Security measures.
Author Krutz, Ronald L., 1938-
Conley, James W.
LC no. 2004025696
ISBN 0764573977 paperback