𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Practical Internet Security

✍ Scribed by John R. Vacca (auth.)


Publisher
Springer US
Year
2007
Tongue
English
Leaves
516
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


As organizers increase their systems links across enterprise-wide networks and VPNs, as well as their exposure to customers, competitors, browsers, and hackers, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats.

Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This volume provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. This volume provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing web communications and sites.

All systems administrators and IT security managers will find Practical Internet Security an essential practical resource. This book is also suitable for graduate-level students in computer science.

✦ Table of Contents


Front Matter....Pages i-xxi
Front Matter....Pages 1-1
Internet Technologies....Pages 3-26
Basic Security Issues....Pages 27-36
Front Matter....Pages 37-37
Real Threats That Impact Security....Pages 39-46
A Security Policy: The Foundation of Your Protection....Pages 47-55
Front Matter....Pages 57-57
Steps to Take Now....Pages 59-76
Responding to Attacks....Pages 77-142
Front Matter....Pages 143-143
Threats and Vulnerabilities....Pages 145-175
Protecting Your Web Browser....Pages 177-182
Front Matter....Pages 183-183
Basic Operating System and TCP/IP Concepts....Pages 185-192
Early System Security Improvements....Pages 193-201
Front Matter....Pages 203-203
Impersonating Users....Pages 205-209
How Masqueraders Infiltrate a System....Pages 211-224
Holding Your Defensive Line....Pages 225-231
Front Matter....Pages 233-233
Unauthorized Listening and Looking....Pages 235-241
Countering or not Countering the Eavesdropper: That’s the Question?....Pages 243-254
Front Matter....Pages 255-255
The Forger’s Arsenal....Pages 257-267
Shielding your Assets....Pages 269-274
Front Matter....Pages 275-275
Denial-of-Service Attacks....Pages 277-279
Constructing Your Bastions....Pages 281-284
The Importance of Firewalls....Pages 285-292
Front Matter....Pages 293-293
Operating Systems that Pose Security Risks....Pages 295-307
Network Security....Pages 309-316
Front Matter....Pages 317-317
Controlling Access....Pages 319-324
Extended Web Site Security Functionality....Pages 325-329
Securing Web Communications with SSL VPNS....Pages 331-335
Front Matter....Pages 337-337
Why Digital Certificates are Used....Pages 339-348
Certificate Authorities....Pages 349-354
Trusting SSL CAs in Servers and Browsers....Pages 355-361
Front Matter....Pages 363-363
Protecting Servers and Clients with Firewalls....Pages 365-371
Choosing the Right Firewall....Pages 373-397
Firewall Topologies....Pages 399-410
Selecting Firewall Security Topology Policy....Pages 411-430
Front Matter....Pages 431-431
Identifying and Responding to Security Violations....Pages 433-438
Real-Time Monitoring and Auditing....Pages 439-443
Limiting Damage....Pages 445-448
Keeping Up to Date on New Threats....Pages 449-451
Emerging Technologies....Pages 453-455
Summary, Conclusions and Recommendations....Pages 457-468
Back Matter....Pages 469-536

✦ Subjects


Computer Communication Networks; Information Systems Applications (incl.Internet); Data Structures, Cryptology and Information Theory; Data Encryption; Computer Systems Organization and Communication Networks


πŸ“œ SIMILAR VOLUMES


Practical Internet Security
✍ John R. Vacca πŸ“‚ Library πŸ“… 2006 🌐 English

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protect

Practical UNIX and Internet Security
✍ Schwartz, Alan;Garfinkel, Simson;Spafford, Gene πŸ“‚ Library πŸ“… 2011 πŸ› O'Reilly Media, Inc 🌐 English

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the or

Practical Unix and Internet Security
✍ Simson Garfinkel, Gene Spafford πŸ“‚ Library πŸ“… 1996 πŸ› Model Hobby 🌐 English

Practical Unix & Internet Security is on its second edition, and its maturity shows. To call this highly readable book comprehensive is an understatement. The breadth is vast, from fundamentals (definitions of computer security; the history of Unix) and commonsense but little-observed security basic

Secure Internet Practices: Best Practice
✍ Patrick McBride, Jody Patilla, Craig Robinson, Peter Thermos, Edward P. Moser πŸ“‚ Library πŸ“… 2001 🌐 English

Is your e-business secure? Have you done everything you can to protect your enterprise and your customers from the potential exploits of hackers, crackers, and other cyberspace menaces? As we expand the brave new world of e-commerce, we are confronted with a whole new set of security problems. Deali