Fundamentals of Network Security (絕)
- 20本以上,享 8.5折
售價
$
洽詢
- 一般書籍
- ISBN:9780072230932
- 作者:Eric Maiwald
- 版次:1
- 年份:2004
- 出版商:McGraw-Hill
- 頁數/規格:645頁/平裝單色
書籍介紹
本書特色
目錄
Description
Lock down your most important information by understanding numerous practical security applications in different environments. Robust coverage includes the most recent advances in technology and the law, including wireless security, biometrics, Windows, IDS technology, as well as the new Patriot Act, homeland security initiatives, and special information on relevant state laws. End-of-chapter review sections include summaries, key term lists, quizzes, and lab projects.
Fundamentals of Network Security is a comprehensive introduction to computer and network security. It provides a fundamental understanding of security best practices, laws, and standards that will enable you to build a complete security program. It includes the most recent advances in security tools and platform-specific defenses.
Inside this book, you will learn to:
Lock down your most important information by understanding numerous practical security applications in different environments. Robust coverage includes the most recent advances in technology and the law, including wireless security, biometrics, Windows, IDS technology, as well as the new Patriot Act, homeland security initiatives, and special information on relevant state laws. End-of-chapter review sections include summaries, key term lists, quizzes, and lab projects.
Fundamentals of Network Security is a comprehensive introduction to computer and network security. It provides a fundamental understanding of security best practices, laws, and standards that will enable you to build a complete security program. It includes the most recent advances in security tools and platform-specific defenses.
Inside this book, you will learn to:
- Assess the threats, vulnerabilities, and risks to a network
- Defend against access, modification, denial-of-service, and repudiation attacks
- Identify a variety of hacking methods, including sniffing, spoofing, viruses, Trojan horses, and worms
- Apply new federal and state laws, including the Patriot Act, HIPAA, and Graham Leach-Bliley
- Configure wireless security technologies
- Create policy, manage risk, and implement an information security program
- Develop a backup and recovery plan
- Apply security technologies such as firewalls, VPNs, encryption methods, and intrusion detection systems
- Implement platform-specific security measures for computer desktops, UNIX, and Windows NT/2000/2003
- Implement security measures for e-commerce
Features
- Critical Skills Identified in Each Chapter
- Easy-to-Understand Diagrams and Figures
- Blueprints That Illustrate Key Security Concepts for Quick Reference
- Detailed Step-by-Step Projects
- Progress Check Exercises
- Ask the Expert Sidebars
- Helpful Notes, Tips, and Cautions
- Chapter Summaries and Key Term Lists
- End-of-Chapter Quizzes and Lab Projects
Table of Contents
PART I: Information Security Basics
1: What Is Information Security'
2: Types of Attacks
3: Hacker Techniques
4: Information Security Services
PART II: Groundwork
5: Legal Issues in Information Security
6: Policy
7: Managing Risk
8: Information Security Process
9: Information Security Best Practices
PART III: Security Technologies
10: Firewalls
11: Virtual Private Networks
12: Encryption
13: Intrusion Detection
PART IV: Practical Applications and Platform-Specific Implementations
14: Desktop Protection
15: Unix Security Issues
16: Windows NT Security Issues
17: Windows 2000/ Windows 2003 Server Security Issues
18: Internet Architecture
19: E-Commerce Security Needs
20: Wireless Security
PART I: Information Security Basics
1: What Is Information Security'
2: Types of Attacks
3: Hacker Techniques
4: Information Security Services
PART II: Groundwork
5: Legal Issues in Information Security
6: Policy
7: Managing Risk
8: Information Security Process
9: Information Security Best Practices
PART III: Security Technologies
10: Firewalls
11: Virtual Private Networks
12: Encryption
13: Intrusion Detection
PART IV: Practical Applications and Platform-Specific Implementations
14: Desktop Protection
15: Unix Security Issues
16: Windows NT Security Issues
17: Windows 2000/ Windows 2003 Server Security Issues
18: Internet Architecture
19: E-Commerce Security Needs
20: Wireless Security