Network Security: The Complete Reference
暫譯: 網路安全:完整參考指南
Mark Rhodes-Ousley, Roberta Bragg, Keith Strassberg
- 出版商: McGraw-Hill Education
- 出版日期: 2003-11-17
- 售價: $2,550
- 貴賓價: 9.5 折 $2,423
- 語言: 英文
- 頁數: 896
- 裝訂: Paperback
- ISBN: 0072226978
- ISBN-13: 9780072226973
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$680$537 -
$650$514 -
$980$774 -
$880$695 -
$960$912 -
$680$646 -
$1,176Database Management Systems, 3/e (IE-Paperback)
-
$560$442 -
$1,920$1,824 -
$760$600 -
$590$466 -
$920$727 -
$590$466 -
$945Head First EJB: Passing the Sun Certified Business Component Developer Exam
-
$560$476 -
$980$774 -
$2,370$2,252 -
$1,068Fundamentals of Database Systems, 4/e (IE)
-
$490$417 -
$480$379 -
$750$593 -
$780$616 -
$650$507 -
$550$468 -
$580$493
相關主題
商品描述
Summary
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
The Most Authoritative Volume Available on Network Security
Includes a Security Dictionary and contributions from topical experts!
The solution to todays computer system security ills will only be solved when organizations obtain and implement a network security program. This comprehensive resource provides all the information necessary to formulate strategies to reach that goal. Learn to plan, implement, and maintain a secure network, and protect confidential information such as customer lists, credit card numbers, and stockholder names, and addresses. Prevent the attack or theft of specialized information such as trade secrets, formulas, production details, and other intellectual property. Network Security: The Complete Reference provides critical strategies, concepts, techniques, and solutions to keep your network system secure.
- Learn what it takes to build a solid security architecture
- Manage and control all access points to your digital data
- Anticipate incidents using risk analysis, threat definition, and
vulnerability assessment
- Secure confidentiality, integrity, privacy, and availability
- Understand how HIPAA, Gramm-Leach-Bliley and other security legislation
affects you
- Learn about a California law that requires compliance from all organizations, no matter what state they reside in
Technical Experts:
- Dr. Nick Efford & Steve Wright, Windows .NET Security
- Ken Pfeil, Physical Security
- Ben Rothke, Operating System Security
- Roger A. Grimes, Intrusion Detection
- Anil Desai & Rob Kraft, Database Security
- Ole Drews Jensen, Router & Device Security
- Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
- Michael Howard, Secure Software
- Thaddeus Fortenberry & Eric Maiwald, VPN Security
- Michael ODea, Windows Security
- Brian Buege, Michael Judd & Jim Keogh, J2EE Security
- Bernard Chapple, Disaster Recovery
- Glen Carty & Steve Thomas, Novell Security
- Christian Genetski & Curtis Karnow, Legal Issues
- Curtis W. Rose, Incident Response & Computer Forensics
- Thomas Knox & Robert Clugston, Linux/UNIX Security
- Barak Weicheselbaum, Application Security
Table of Contents
- Part 1 Information Security
Foundations
Ch. 1: Introduction
Ch. 2: Network Security Overview
Ch. 3: Security Policy Development
Part 2 Security Architecture Components
Ch. 4: Network Security Architecture
Ch. 5: Computer Security Architecture
Ch. 6: Authentication and Authorization Methods
Ch. 7: Application Security
Ch. 8: Unix Security
Ch. 9: Windows Security
Ch. 10: Novell NetWare
Ch. 11: J2EE Security
Ch. 12: Database Security
Ch. 13: Virtual Private Networks (VPNs)
Ch. 14: Wireless Network Security
Ch. 15: Data Security Architecture
Part 3 Managing the Security Infrastructure
Ch. 16: Security Management Architecture
Ch. 17: Security Organization
Ch. 18: Integrity and Availability Architecture
Ch. 19: Disaster Recovery and Business Continuity
Ch. 20: Incident Response and Forensic Analysis
Ch. 21: Physical Security
Part 4 Appendices
Appendix A: Organization Certification, System Evaluation and Assurance
Appendix B: HIPAA Preparation
Appendix C: Gramm-Leach-Bliley Act (GLB) Preparation
Appendix D: Dictionary of IT Security Terms
商品描述(中文翻譯)
摘要
本書教授端到端的網路安全概念和技術。包含如何設計全面的安全防禦模型的綜合資訊。此外,還揭示了如何制定和實施計算機、員工和物理安全政策,如何設計和管理身份驗證及授權方法,以及更多內容。
網路安全領域最具權威的著作
本書包含安全詞典及來自專家學者的貢獻!
當今計算機系統安全問題的解決方案,只有在組織獲得並實施網路安全計畫後才能解決。本書是一本全面的資源,提供制定達成該目標所需的所有資訊。學習如何規劃、實施和維護安全的網路,並保護客戶名單、信用卡號碼、股東姓名及地址等機密資訊。防止專業資訊如商業機密、公式、生產細節及其他智慧財產的攻擊或盜竊。《網路安全:完整參考》提供關鍵的策略、概念、技術和解決方案,以確保您的網路系統安全。
- 學習建立穩固的安全架構所需的條件
- 管理和控制所有數位資料的存取點
- 使用風險分析、威脅定義和脆弱性評估預測事件
- 確保機密性、完整性、隱私和可用性
- 了解HIPAA、Gramm-Leach-Bliley法案及其他安全法規如何影響您
- 了解加州法律,要求所有組織遵守,無論其所在州為何
技術專家:
- Dr. Nick Efford & Steve Wright, Windows .NET Security
- Ken Pfeil, Physical Security
- Ben Rothke, Operating System Security
- Roger A. Grimes, Intrusion Detection
- Anil Desai & Rob Kraft, Database Security
- Ole Drews Jensen, Router & Device Security
- Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
- Michael Howard, Secure Software
- Thaddeus Fortenberry & Eric Maiwald, VPN Security
- Michael ODea, Windows Security
- Brian Buege, Michael Judd & Jim Keogh, J2EE Security
- Bernard Chapple, Disaster Recovery
- Glen Carty & Steve Thomas, Novell Security
- Christian Genetski & Curtis Karnow, Legal Issues
- Curtis W. Rose, Incident Response & Computer Forensics
- Thomas Knox & Robert Clugston, Linux/UNIX Security
- Barak Weicheselbaum, Application Security
目錄
第一部分 資訊安全基礎
- 第1章:介紹
- 第2章:網路安全概述
- 第3章:安全政策發展
第二部分 安全架構組件
- 第4章:網路安全架構
- 第5章:計算機安全架構
- 第6章:身份驗證和授權方法
- 第7章:應用安全
- 第8章:Unix安全
- 第9章:Windows安全
- 第10章:Novell NetWare
- 第11章:J2EE安全
- 第12章:資料庫安全
- 第13章:虛擬私人網路(VPN)
- 第14章:無線網路安全
- 第15章:資料安全架構
第三部分 管理安全基礎設施
- 第16章:安全管理架構
- 第17章:安全組織
- 第18章:完整性和可用性架構
- 第19章:災難恢復和業務持續性
- 第20章:事件響應和取證分析
- 第21章:物理安全
第四部分 附錄
- 附錄A:組織認證、系統評估和保證
- 附錄B:HIPAA準備
- 附錄C:Gramm-Leach-Bliley法案(GLB)準備
- 附錄D:資訊安全術語詞典