Network security : a beginner's guide / Eric Maiwald.
Material type: TextLanguage: English Series: Network professional's libraryPublication details: New York : Osborne/McGraw-Hill, c2001. Description: xxix, 400 p. : ill. ; 24 cmISBN: 0072133244; 9780072133240Subject(s): Computer networks -- Security measures | Computer security | Computer ScienceDDC classification: 005.8 LOC classification: TK5105.59 | .M35 2001Online resources: Publisher description | Table of contents | Contributor biographical information | WorldCat details | Ebook FulltextItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
Text | Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-1 | Not For Loan | 12643 | ||
Text | Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-2 | Available | 12644 | ||
Text | Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-3 | Available | 12645 | ||
Text | Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.8 MAN 2001 (Browse shelf(Opens below)) | C-4 | Available | 12646 |
TOC Part I : Information security basics --
What is information security? --
Types of attacks --
Information security services --
Part II : Ground Work --
Legal issues in information security --
Policy --
Managing risk --
Information security process --
Information security best practices --
Part III : Practical solutions --
Internet architecture --
Virtual private networks --
E-commerce security needs --
Encryption --
Hacker techniques --
Intrusion detection --
Part IV : Platform-specific implementations --
Unix security issues --
Windows NT security issues --
Windows 2000 security issues --
Part V : Appendixes --
Process project plan ; Unix vs. Windows : which is more secure? ; Resources to learn more about security ; Incident response procedure testing scenario
Summary:
Explains how to create a successful security program, covering anti-virus software, firewalls, smart cards, intrusion detection, secure e-commerce transactions, and recommended technical and administrative practices.
CSE
Tahur Ahmed
There are no comments on this title.