Network Security Bible - Eric Cole , Ronald L. Krutz , James W.... - Librairie Eyrolles
Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Network Security Bible
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Network Security Bible

Network Security Bible

Defend corporae systems and wireless networks agains intrusion - Apply the latest techniques for protecting information, testing your system, and responding to attacks - Learn from recognized experts in government, media, academic, and corporate security

Eric Cole, Ronald L. Krutz, James W. Conley - Collection 100% Comprehensive Authoritative What You Need

660 pages, parution le 04/02/2005

Résumé

If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how to evaluate your security. You'll even get guidance in making the case for enhanced security to leaders of the organization. Whether you're learning the basics or seeking more detailed knowledge, you'll find this reference invaluable.

Inside, you'll find complete coverage of network security issues

  • Identify and apply best practices for Windows®, UNIX®, and Linux® systems
  • Understand the fundamental tenets of information system security, especially confidentiality, integrity, and availability (CIA)
  • Set up appropriate security policies and manage implementation
  • Learn to secure Web browsers, protect corporate portals, and implement secure e-commerce applications
  • Configure e-mail systems and set up different types of servers for safer access
  • Choose the best security approach for various network protocols, particularly OSI and TCP
  • Explore the special security issues of wireless networks
  • Examine cryptography and steganography and how they can support communications security
  • Test your system and interpret the results

L'auteur - Eric Cole

ERIC COLE is currently Chief Scientist for The Sytex Group's Information Warfare Center, where he heads up cutting-edge research in steganography and network security. Prior to this, Cole worked for more than five years in security for the CIA, during which time he earned six achievement awards and led a team of security professionals in the design and deployment of secure communications systems. Cole continues to consult for many government agencies. He holds several professional certifications and helped develop several of the SANS GIAC security certifications and corresponding courses. He has appeared on CNN, CBS News, and 60 Minutes.

L'auteur - Ronald L. Krutz

Ronald L. Krutz, PhD, PE, CISSP, is Director of Privacy for Corbett Technologies, specializing in information assurance and privacy appraisal methodologies. Dr. Krutz is also a distinguished visiting lecturer in the University of New Haven Computer Forensics Program. He was a lead instructor for the CISSP CBK review seminars, former associate director of the Carnegie Mellon Research Institute (CMRI), and a faculty member in the Carnegie Mellon University Department of Electrical and Computer Engineering. Krutz is the author of four previous books, including The CISSP Prep Guide (Wiley).

L'auteur - James W. Conley

James W. Conley has been a security officer in the United States Navy and a senior security specialist on CIA development efforts.

Sommaire

  • Security Principles and Practices
    • Information System Security Principles
    • Information System Security Management
    • Access Control Considerations
  • Operating Systems and Applications
    • Windows Security
    • UNIX and Linux Security
    • Web Browser and Client Security
    • Web Security
    • E-mail Security
    • Domain Name System
    • Server Security
  • Network Security Fundamentals
    • Network Protocols
    • Wireless Security
    • Network Architecture Fundamentals
  • Communications
    • Secret Communication
    • Covert Communication
    • Applications of Secure/Covert Communication
  • The Security Threat and the Response
    • Intrusion Detection and Response
    • Security Assessments, Testing, and Evaluation
    • Putting Everything Together
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) Eric Cole, Ronald L. Krutz, James W. Conley
Collection 100% Comprehensive Authoritative What You Need
Parution 04/02/2005
Nb. de pages 660
Format 18,5 x 23,5
Couverture Broché
Poids 996g
Intérieur Noir et Blanc
EAN13 9780764573972
ISBN13 978-0-7645-7397-2

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription