Fundamentals of Network Security
1st Edition
0072230932
·
9780072230932
© 2004 | Published: November 5, 2003
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This hands-on, project-based approach to the fundamentals …
Read More
Request Review Copy
Receive via shipping:
- Print bound version of the complete text
PART I: Information Security Basics 1: What Is Information Security? 2: Types of Attacks 3: Hacker Techniques 4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
2: Types of Attacks 3: Hacker Techniques 4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
4: Information Security Services PART II: Groundwork 5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
5: Legal Issues in Information Security 6: Policy 7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
7: Managing Risk 8: Information Security Process 9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
9: Information Security Best Practices PART III: Security Technologies 10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
10: Firewalls 11: Virtual Private Networks 12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
12: Encryption 13: Intrusion Detection PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
PART IV: Practical Applications and Platform-Specific Implementations 14: Desktop Protection 15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
15: Unix Security Issues 16: Windows NT Security Issues 17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
17: Windows 2000/ Windows 2003 Server Security Issues 18: Internet Architecture 19: E-Commerce Security Needs 20: Wireless Security
19: E-Commerce Security Needs 20: Wireless Security
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program.This book introduces a strong foundation that includes security policy, planning, and development of good processes. A step-by-step design teaches students security implementation using recent advances in security tools, such as firewalls, VPN's, encryption, techniques, and intrusion detection devises. Platform-specific defenses are revealed for the desktop, Windows networks, UNIX, Internet, and wireless systems. Laws and government regulation are also covered, including the Patriot Act, homeland security initiatives, and special information on relevant state laws.
This hands-on, project-based approach to the fundamentals of network security concepts and skills helps students understand security best practices, laws, and standards that will enable them to build a complete security program.This book introduces a strong foundation that includes security policy, planning, and development of good processes. A step-by-step design teaches students security implementation using recent advances in security tools, such as firewalls, VPN's, encryption, techniques, and intrusion detection devises. Platform-specific defenses are revealed for the desktop, Windows networks, UNIX, Internet, and wireless systems. Laws and government regulation are also covered, including the Patriot Act, homeland security initiatives, and special information on relevant state laws.