Network Security: The Complete Reference

Mark Rhodes-Ousley, Roberta Bragg, Keith Strassberg

  • 出版商: McGraw-Hill Education
  • 出版日期: 2003-11-17
  • 售價: $2,320
  • 貴賓價: 9.5$2,204
  • 語言: 英文
  • 頁數: 896
  • 裝訂: Paperback
  • ISBN: 0072226978
  • ISBN-13: 9780072226973
  • 相關分類: 資訊安全
  • 下單後立即進貨 (約2~4週)





Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.

The Most Authoritative Volume Available on Network Security

Includes a Security Dictionary and contributions from topical experts!

The solution to todays computer system security ills will only be solved when organizations obtain and implement a network security program. This comprehensive resource provides all the information necessary to formulate strategies to reach that goal. Learn to plan, implement, and maintain a secure network, and protect confidential information such as customer lists, credit card numbers, and stockholder names, and addresses. Prevent the attack or theft of specialized information such as trade secrets, formulas, production details, and other intellectual property. Network Security: The Complete Reference provides critical strategies, concepts, techniques, and solutions to keep your network system secure.

  • Learn what it takes to build a solid security architecture
  • Manage and control all access points to your digital data
  • Anticipate incidents using risk analysis, threat definition, and vulnerability assessment
  • Secure confidentiality, integrity, privacy, and availability
  • Understand how HIPAA, Gramm-Leach-Bliley and other security legislation affects you
  • Learn about a California law that requires compliance from all organizations, no matter what state they reside in

Technical Experts:

  • Dr. Nick Efford & Steve Wright, Windows .NET Security
  • Ken Pfeil, Physical Security
  • Ben Rothke, Operating System Security
  • Roger A. Grimes, Intrusion Detection
  • Anil Desai & Rob Kraft, Database Security
  • Ole Drews Jensen, Router & Device Security
  • Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
  • Michael Howard, Secure Software
  • Thaddeus Fortenberry & Eric Maiwald, VPN Security
  • Michael ODea, Windows Security
  • Brian Buege, Michael Judd & Jim Keogh, J2EE Security
  • Bernard Chapple, Disaster Recovery
  • Glen Carty & Steve Thomas, Novell Security
  • Christian Genetski & Curtis Karnow, Legal Issues
  • Curtis W. Rose, Incident Response & Computer Forensics
  • Thomas Knox & Robert Clugston, Linux/UNIX Security
  • Barak Weicheselbaum, Application Security

Table of Contents

  Part 1 Information Security Foundations
   Ch. 1: Introduction
   Ch. 2: Network Security Overview
   Ch. 3: Security Policy Development
  Part 2 Security Architecture Components
   Ch. 4: Network Security Architecture
   Ch. 5: Computer Security Architecture
   Ch. 6: Authentication and Authorization Methods
   Ch. 7: Application Security
   Ch. 8: Unix Security
   Ch. 9: Windows Security
   Ch. 10: Novell NetWare
   Ch. 11: J2EE Security
   Ch. 12: Database Security
   Ch. 13: Virtual Private Networks (VPNs)
   Ch. 14: Wireless Network Security
   Ch. 15: Data Security Architecture
  Part 3 Managing the Security Infrastructure
   Ch. 16: Security Management Architecture
   Ch. 17: Security Organization
   Ch. 18: Integrity and Availability Architecture
   Ch. 19: Disaster Recovery and Business Continuity
   Ch. 20: Incident Response and Forensic Analysis
   Ch. 21: Physical Security
  Part 4 Appendices
    Appendix A: Organization Certification, System Evaluation and Assurance
    Appendix B: HIPAA Preparation
    Appendix C: Gramm-Leach-Bliley Act (GLB) Preparation
    Appendix D: Dictionary of IT Security Terms