Network security : a beginner's guide / Eric Maiwald.
Material type:
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
EWU Library Reserve Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-1 | Not For Loan | 12643 | ||
![]() |
EWU Library Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-2 | Available | 12644 | ||
![]() |
EWU Library Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-3 | Available | 12645 | ||
![]() |
EWU Library Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-4 | Available | 12646 |
TOC Part I : Information security basics --
What is information security? --
Types of attacks --
Information security services --
Part II : Ground Work --
Legal issues in information security --
Policy --
Managing risk --
Information security process --
Information security best practices --
Part III : Practical solutions --
Internet architecture --
Virtual private networks --
E-commerce security needs --
Encryption --
Hacker techniques --
Intrusion detection --
Part IV : Platform-specific implementations --
Unix security issues --
Windows NT security issues --
Windows 2000 security issues --
Part V : Appendixes --
Process project plan ; Unix vs. Windows : which is more secure? ; Resources to learn more about security ; Incident response procedure testing scenario
Summary:
Explains how to create a successful security program, covering anti-virus software, firewalls, smart cards, intrusion detection, secure e-commerce transactions, and recommended technical and administrative practices.
CSE
Tahur Ahmed
There are no comments on this title.