White-Hat Security Arsenal: Tackling the Threats
Aviel D. Rubin
- 出版商: Addison Wesley
- 出版日期: 2001-07-01
- 定價: $1,650
- 售價: 5.0 折 $825
- 語言: 英文
- 頁數: 368
- 裝訂: Paperback
- ISBN: 0201711141
- ISBN-13: 9780201711141
-
相關分類:
資訊安全
立即出貨(限量)
買這商品的人也買了...
-
$840Practical Network Cabling (Paperback)
-
$490JavaServer Pages (Paperback)
-
$299Instant Javaserver Pages (Paperback)
-
$399DBA's Guide to Databases on Linux
-
$699Pure JSP: Java Server Pages
-
$199Access Denied: The Complete Guide to Protecting Your Business Online (Hardcover)
-
$860$679 -
$580$458 -
$680$537 -
$560$442 -
$450$356 -
$640$506 -
$450$356 -
$460$363 -
$580$458 -
$680$537 -
$620$490 -
$650$514 -
$600$474 -
$480$379 -
$560$442 -
$420$332 -
$400$316 -
$880$616 -
$750$593
相關主題
商品描述
Description
A leading security authority provides a fresh problem-solving approach to security. This arsenal of security techniques provides an explanation of what the real threats are. Aviel Rubin covers every day security issues that every student should know as they move onto the real world - eg. storing data securely, secure data transfer, protecting a network perimeter, online interaction and commerce...each of these are broken down into specific problems and their solutions.
Appropriate Courses
Features
Table Of Contents
Foreword.
Preface.
I: IS THERE REALLY A THREAT?
1. Shrouded in Secrecy.
2. Computer Security Risks.
Confidentiality.
Privacy.
Resource Availability.
Why Risks Exist.
The User.
Poor Administration.
Exploiting Risks.
Moving On.
3. The Morris Worm Meets the Love Bug: Computer Viruses and Worms.
A Touch of History.
The Morris Worm.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Melissa.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
CIH Chernobyl.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Happy.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Worm.ExploreZip.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Bubbleboy.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Babylonia.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
The Love Bug.
How and Why It Worked.
The Consequences.
How We Recovered.
Lessons Learned.
Summary.
II: STORING DATA SECURELY.
4. Local Storage.
Cryptographic Security.
Cryptography Is Not Enough.
Basic Encryption and Data Integrity.
Protecting Data with Passwords.
Cryptographic File Systems.
Case Studies.
PGPDisk.
EFS in Windows 2000.
Further Reading.
5. Remote Storage.
NFS Security.
Adding Security.
Strengthening Passwords.
Access Control Lists and Capabilities.
AFS.
Case Study.
Further Reading.
6. Secure Backup.
Physical Security.
Backup over a Network.
Key Granularity.
Backup Products.
BitSTOR.
Secure Backup Systems.
BackJack.
Datalock.
NetMass SystemSafe.
Saf-T-Net.
Safeguard Interactive.
Veritas Telebackup.
Deleting Backups.
Case Study.
Incremental Backups.
Further Reading.
III: SECURE DATA TRANSFER.
7. Setting up a Long-Term Association.
Identity in Cyberspace.
Exchanging Public Keys in Person.
Certification Authorities.
Certificate Hierarchies.
Long-Term Relationships within an Organization.
Global Trust Register.
Revocation.
Long-Term Relationships in the Wild.
Managing Private Keys.
Symmetric Keys.
Case Study.
Summary.
Further Reading.
8. Deriving Session Keys.
Key Exposure.
Perfect Forward Secrecy.
Security Associations.
Picking a Random Key.
Session Keys from Symmetric Long-Term Keys.
Another Approach.
Session Keys from Long-Term Public Keys.
Session Keys in SSL.
Protocol Design and Analysis.
Case Study.
ISAKMP Exchanges.
Key Refreshment.
Primes in OAKLEY.
Further Reading.
9. Communicating Securely After Key Setup.
Authentication.
Which Layer Is Best for Security?
The Link Layer.
The Network Layer.
The Transport Layer.
The Application Layer.
Replay Prevention.
Case Study.
AH.
Further Reading.
IV: PROTECTING AGAINST NETWORK THREATS.
10. Protecting a Network Perimeter.
Network Perimeter.
Benefits of Firewalls.
Types of Firewalls.
Application-Level Gateways.
Using the Firewall.
Web Server Placement.
Exit Control.
Remote Access8.
Dial-up Access.
VPN Access.
Web-Only Access.
Case Study.
Further Reading.
11. Defending against Attacks.
Attacks.
Denial of Service.
Defense.
Monitoring the Traffic.
Intrusion Detection.
Defense against DDOS.
Other Tools.
Case Study.
V: COMMERCE AND PRIVACY.
12. Protecting E-Commerce Transactions.
The SSL Protocol.
Configuring a Browser.
Configuring a Server.
Security.
Performance.
Caching.
Case Study.
Risks of Passport.
Further Reading.
13. Protecting Privacy.
What Is at Risk?
E-Mail Privacy.
Anonymous E-Mail.
How Is Personal Privacy Compromised?
Indirect Methods.
Defense Mechanisms and Countermeasures.
Protecting Credit Card Information.
Safeguarding Your Browsing History.
Hiding Your Surfing.
Posting Anonymously to the Web.
Case Study.
Summary.
Further Reading.
Glossary.
Bibliography.
Index. 0201711141T01 001.
商品描述(中文翻譯)
描述
一位領先的安全專家提供了一種新的解決安全問題的方法。這套安全技術工具包解釋了真正的威脅是什麼。Aviel Rubin涵蓋了每天都應該了解的安全問題,因為學生們即將進入現實世界 - 例如,安全地存儲數據,安全的數據傳輸,保護網絡邊界,線上互動和商業交易...每個問題都被細分為具體的問題和解決方案。
適合的課程
特點
目錄
前言。
前言。
第一部分:真的有威脅嗎?
1. 隱秘的神秘感。
2. 電腦安全風險。
什麼是風險。
數據、時間和金錢。
保密性。
隱私。
資源可用性。
為什麼存在風險。
錯誤的代碼。
用戶。
管理不善。
利用風險。
繼續前進。
3. 莫里斯蠕蟲遇到愛情蟲:電腦病毒和蠕蟲。
術語。
一點歷史。
莫里斯蠕蟲。
它何時出現以及它做了什麼。
它如何以及為什麼運作。
後果。
我們如何恢復。
吸取教訓。
梅麗莎。
它何時出現以及它做了什麼。
它如何以及為什麼運作。
後果。
我們如何恢復。
吸取教訓。