Information Security The Complete Reference
β Scribed by Rhodes-Ousley, Mark
- Publisher
- McGraw-Hill Education
- Year
- 2013
- Tongue
- English
- Edition
- 2nd edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Develop and implement an effective end-to-end security program
Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.
Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You'll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection,...
β¦ Table of Contents
Part 1: Network Security Foundations 1 Overview2 Risk Analysis and Defense Models3 Security Policies4 Security Organization Part 2: Access Control 5 Security Management6 Physical Security7 Operational Security8 Authentication and Authorization Controls9 Data SecurityPart 3: Network Security 10 Network Design Considerations11 Network Device Security12 Firewalls13 Virtual Private Networks14 Wireless Network Security15 Intrusion Detection Systems16 Integrity and Availability17 Network Role-Based Security18 Voice-Over-IP (VOIP) Security Part 4: System Security 19 Operating System Security Models20 Unix Security21 Linux Security22 Windows Security Part 5: Application Security 23 Principles of Application Security24 Controlling Application Behavior25 Writing Secure Software26 J2EE Security27 Windows .NET Security28 Database Security Part 6: Planning and Response 29 Disaster Recovery and Business Continuity30 Attacks and Countermeasures31 Incident Response and Forensic Analysis32 Legal, Regulatory, and Standards Compliance
β¦ Subjects
Computer networks--Security measures;Computer security;Computer networks -- Security measures
π SIMILAR VOLUMES
Develop and implement an effective end-to-end security program Todayβs complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <em>Information Security: The Complete Reference, Second Edition</em> (previously titled <em>Ne
<h4>Develop and implement an effective end-to-end security program</h4> <p>Todayβs complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titled