Network security : a beginner's guide / Eric Maiwald.
Material type:
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-1 | Not For Loan | 12643 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-2 | Available | 12644 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-3 | Available | 12645 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-4 | Available | 12646 |
Browsing Dr. S. R. Lasker Library, EWU shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.7585 THO 2002 OCA/OCP : | 005.8 CHH 2001 Hack attacks encyclopedia : | 005.8 HAH 2003 Hacking linux exposed / | 005.8 MAN 2001 Network security : | 005.8 MAN 2001 Network security : | 005.8 MAN 2001 Network security : | 005.8 NAF 2021 Fundamentals of information security : a complete go-to guide for beginners to understand all the aspects of information security / |
TOC Part I : Information security basics --
What is information security? --
Types of attacks --
Information security services --
Part II : Ground Work --
Legal issues in information security --
Policy --
Managing risk --
Information security process --
Information security best practices --
Part III : Practical solutions --
Internet architecture --
Virtual private networks --
E-commerce security needs --
Encryption --
Hacker techniques --
Intrusion detection --
Part IV : Platform-specific implementations --
Unix security issues --
Windows NT security issues --
Windows 2000 security issues --
Part V : Appendixes --
Process project plan ; Unix vs. Windows : which is more secure? ; Resources to learn more about security ; Incident response procedure testing scenario
Summary:
Explains how to create a successful security program, covering anti-virus software, firewalls, smart cards, intrusion detection, secure e-commerce transactions, and recommended technical and administrative practices.
CSE
Tahur Ahmed
There are no comments on this title.