Network Security Illustrated

Jason Albanese, Wes Sonnenreich

  • 出版商: McGraw-Hill Education
  • 出版日期: 2003-09-26
  • 售價: $1,580
  • 貴賓價: 9.5$1,501
  • 語言: 英文
  • 頁數: 423
  • 裝訂: Paperback
  • ISBN: 0071415041
  • ISBN-13: 9780071415040
  • 相關分類: 資訊安全
  • 已絕版

買這商品的人也買了...

相關主題

商品描述

 

Summary

If you think a background in computer science is necessary for understanding information security, think again.

Network Security Illustrated explores information security using a simple, powerful methodology and captivating illustrations. This highly accessible approach makes learning how to protect valuable data and computer systems fast and fun.

BONUS: The enclosed wall poster reinforces every major security concept and relationship via intuitive illustrations.

o you want to better understand how computer security impacts your business?

Organized around common business problems instead of technology, this easily navigable, illustrated reference will help you:

1. Understand major security concepts and solutions

2. Identify limitations and risks in security strategies

3. Select and implement solutions that are right for your needs

Perfect for all managers who make business decisions about security and need to get up to speed on security concepts, Network Security Illustrated is equally beneficial to network administrators, security specialists, and solutions developers.

LEARN HOW TO:

* Manage and Outsource Security

* Identify and Authenticate Users

* Protect a Network’s Infrastructure

* Store, Hide, and Access Information Securely

* Detect Intrusions and Recover From Disasters

* And much, much more!

Table of Contents

  PART 1 Managing Security
   1 Managing Security: The Security Assessment
   2 Managing Security: Systems and Network Monitoring

  PART 2 Outsourcing Options
   3 Outsourcing Options: Outsourcing Network Monitoring
   4 Outsourcing Options: Outsourcing Disaster Prevention
   5 Outsourcing Options: Outsourcing Proactive Security

  PART 3 Reserving Rights
   6 Reserving Rights: Digital Rights Management
   7 Reserving Rights: Copy Protection

  PART 4 Determining Identity
   8 Determining Identity: Passwords
   9 Determining Identity: Digital Certificates
   10 Determining Identity: Portable Identifiers
   11 Determining Identity: Biometrics

  PART 5 Preserving Privacy
   12 Preserving Privacy: Anonymity
   13 Preserving Privacy: User Tracking
   14 Preserving Privacy: Spam Management

  PART 6 Connecting Networks
   15 Connecting Networks: Networking Hardware
   16 Connecting Networks: Wireless Connections
   17 Connecting Networks: Network Lingo

  PART 7 Hardening Networks
   18 Hardening Networks: Firewalls
   19 Hardening Networks: Network Address Translation
   20 Hardening Networks: Virtual Private Networks
   21 Hardening Networks: Traffic Shaping

  PART 8 Storing Information
   22 Storing Information: Storage Media
   23 Storing Information: Local File Systems
   24 Storing Information: Network File Systems
   25 Storing Information: Databases

  PART 9 Hiding Information
   26 Hiding Information: Cryptography
   27 Hiding Information: Cryptanalysis
   28 Hiding Information: Steganography

  PART 10 Accessing Information
   29 Accessing Information: Client-Server Architecture
   30 Accessing Information: Internet Services
   31 Accessing Information: Remote Access
   32 Accessing Information: Peer-to-Peer Networking
  PART 11 Ensuring Availability