|
" Network security bible / "
Eric Cole, Ronald Krutz, James W. Conley.
Document Type
|
:
|
BL
|
Record Number
|
:
|
878293
|
Main Entry
|
:
|
Cole, Eric.
|
Title & Author
|
:
|
Network security bible /\ Eric Cole, Ronald Krutz, James W. Conley.
|
Edition Statement
|
:
|
2nd ed.
|
Publication Statement
|
:
|
Indianapolis, Ind. :: Wiley Pub.,, ©2009.
|
Series Statement
|
:
|
Bible ;; v. 657
|
Page. NO
|
:
|
1 online resource (xliv, 891 pages) :: illustrations
|
ISBN
|
:
|
0470502495
|
|
:
|
: 0470569999
|
|
:
|
: 6612303484
|
|
:
|
: 9780470502495
|
|
:
|
: 9780470569993
|
|
:
|
: 9786612303487
|
|
:
|
9780470502495
|
Contents
|
:
|
pt. I. Network Security Landscape -- Ch. 1. State of Network Security -- Ch. 2. New Approaches to Cyber Security -- Ch. 3. Interfacing with the Organization -- pt. II. Security Principles and Practices -- Ch. 4. Information System Security Principles -- Ch. 5. Information System Security Management -- Ch. 6. Access Control -- Ch. 7. Attacks and Threats -- pt. III. Operating Systems and Applications -- Ch. 8. Windows Security -- Ch. 9. UNIX and Linux Security -- Ch. 10. Web Browser and Client Security -- Ch. 11. Web Security -- Ch. 12. Electronic mail (E-mail) Security -- Ch. 13. Domain Name System -- Ch. 14. Server Security -- pt. IV. Network Security Fundamentals -- Ch. 15. Network Protocols -- Ch. 16. Wireless Security -- Ch. 17. Network Architecture Fundamentals -- Ch. 18. Firewalls -- Ch. 19. Intrusion Detection/Prevention -- pt. V. Communication -- Ch. 20. Secret Communication -- Ch. 21. Covert Communication -- Ch. 22. Applications of Secure/Covert Communication -- pt. VI. The Security Threat and Response -- Ch. 23. Intrusion Detection and Response -- Ch. 24. Digital Forensics -- Ch. 25. Security Assessments, Testing, and Evaluation -- pt. VII. Integrated Cyber Security -- Ch. 26. Validating Your Security -- Ch. 27. Data Protection -- Ch. 28. Putting Everything Together -- Ch. 29. The Future.
|
Abstract
|
:
|
"Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer security.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25C5985 2009
|
Added Entry
|
:
|
Conley, James W.
|
|
:
|
Krutz, Ronald L.,1938-
|
| |