𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Network security: the complete reference

✍ Scribed by Bragg, Roberta;Strassberg, Keith;Rhodes-Ousley, Mark


Publisher
McGraw-Hill;Osborne
Year
2004
Tongue
English
Leaves
897
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Part I: Network Security Foundations 1: Network Security Overview 2: Risk Analysis and Defense Models 3: Security Policy Development 4: Security Organization Part II: Access Control 5: Physical Security 6: Authentication and Authorization Controls 7: Data Security Architecture 8: Security Management Architecture Part III: Network Architecture 9: Network Design Considerations 10: Network Device Security 11: Firewalls 12: Virtual Private Network Security 13: Wireless Network Security 14: Intrusion-Detection Systems 15: Integrity and Availability Architecture 16: Network Role-Based Security Part IV: Operating System Security 17: Operating System Security Models 18: Common Unix Vulnerabilities 19: Linux Security 20: Windows Security 21: Novell Security Part V: Application Security 22: Principals of Application Security 23: Writing Secure Software 24: J2EE Security 25: Windows .NET Security 26: Database Security Part VI: Response 27: Disaster Recovery and Business Continuity 28: Attacks and Countermeasures 29: Incident Response and Forensic Analysis 30: Legal Issues: The Laws Affecting Information Security Professionals

✦ Subjects


Computer networks--Security measures;Electronic books;Computer networks -- Security measures


πŸ“œ SIMILAR VOLUMES


Storage Networks: The Complete Reference
✍ Robert Spalding πŸ“‚ Library πŸ“… 2003 πŸ› McGraw-Hill Osborne Media 🌐 English

Written for storage professionals, this reference outlines the various architectural considerations of storage area networks (SAN) and network attached storage (NAS), the components that satisfy each storage architecture, and various connectivity options.

Information Security The Complete Refere
✍ Rhodes-Ousley, Mark πŸ“‚ Library πŸ“… 2013 πŸ› McGraw-Hill Education 🌐 English

<p><h4>Develop and implement an effective end-to-end security program</h4><p>Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titl

Information security: the complete refer
✍ Mark Rhodes-Ousley πŸ“‚ Library πŸ“… 2013 πŸ› McGraw-Hill Osborne Media 🌐 English

Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <em>Information Security: The Complete Reference, Second Edition</em> (previously titled <em>Ne