Network Security Bible
Defend corporae systems and wireless networks agains intrusion - Apply the latest techniques for protecting information, testing your system, and responding to attacks - Learn from recognized experts in government, media, academic, and corporate security
Eric Cole, Ronald L. Krutz, James W. Conley - Collection 100% Comprehensive Authoritative What You Need
Résumé
If you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how to evaluate your security. You'll even get guidance in making the case for enhanced security to leaders of the organization. Whether you're learning the basics or seeking more detailed knowledge, you'll find this reference invaluable.
Inside, you'll find complete coverage of network security issues
- Identify and apply best practices for Windows®, UNIX®, and Linux® systems
- Understand the fundamental tenets of information system security, especially confidentiality, integrity, and availability (CIA)
- Set up appropriate security policies and manage implementation
- Learn to secure Web browsers, protect corporate portals, and implement secure e-commerce applications
- Configure e-mail systems and set up different types of servers for safer access
- Choose the best security approach for various network protocols, particularly OSI and TCP
- Explore the special security issues of wireless networks
- Examine cryptography and steganography and how they can support communications security
- Test your system and interpret the results
L'auteur - Eric Cole
ERIC COLE is currently Chief Scientist for The Sytex Group's Information Warfare Center, where he heads up cutting-edge research in steganography and network security. Prior to this, Cole worked for more than five years in security for the CIA, during which time he earned six achievement awards and led a team of security professionals in the design and deployment of secure communications systems. Cole continues to consult for many government agencies. He holds several professional certifications and helped develop several of the SANS GIAC security certifications and corresponding courses. He has appeared on CNN, CBS News, and 60 Minutes.
L'auteur - Ronald L. Krutz
Ronald L. Krutz, PhD, PE, CISSP, is Director of Privacy for Corbett Technologies, specializing in information assurance and privacy appraisal methodologies. Dr. Krutz is also a distinguished visiting lecturer in the University of New Haven Computer Forensics Program. He was a lead instructor for the CISSP CBK review seminars, former associate director of the Carnegie Mellon Research Institute (CMRI), and a faculty member in the Carnegie Mellon University Department of Electrical and Computer Engineering. Krutz is the author of four previous books, including The CISSP Prep Guide (Wiley).
L'auteur - James W. Conley
James W. Conley has been a security officer in the United States Navy and a senior security specialist on CIA development efforts.
Sommaire
- Security Principles and Practices
- Information System Security Principles
- Information System Security Management
- Access Control Considerations
- Operating Systems and Applications
- Windows Security
- UNIX and Linux Security
- Web Browser and Client Security
- Web Security
- E-mail Security
- Domain Name System
- Server Security
- Network Security Fundamentals
- Network Protocols
- Wireless Security
- Network Architecture Fundamentals
- Communications
- Secret Communication
- Covert Communication
- Applications of Secure/Covert Communication
- The Security Threat and the Response
- Intrusion Detection and Response
- Security Assessments, Testing, and Evaluation
- Putting Everything Together
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | Eric Cole, Ronald L. Krutz, James W. Conley |
Collection | 100% Comprehensive Authoritative What You Need |
Parution | 04/02/2005 |
Nb. de pages | 660 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 996g |
Intérieur | Noir et Blanc |
EAN13 | 9780764573972 |
ISBN13 | 978-0-7645-7397-2 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet