Introduction | |
Acknowledgments | |
Managing Security | p. 1 |
Managing Security: The Security Assessment | p. 13 |
Managing Security: Systems and Network Monitoring | p. 19 |
Outsourcing Options | p. 27 |
Outsourcing Options: Outsourcing Network Monitoring | p. 39 |
Outsourcing Options: Outsourcing Disaster Prevention | p. 47 |
Outsourcing Options: Outsourcing Proactive Security | p. 55 |
Reserving Rights | p. 63 |
Reserving Rights: Digital Rights Management | p. 79 |
Reserving Rights: Copy Protection | p. 87 |
Determining Identity | p. 95 |
Determining Identity: Passwords | p. 105 |
Determining Identity: Digital Certificates | p. 115 |
Determining Identity: Portable, Identifiers | p. 123 |
Determining Identity: Biometrics | p. 129 |
Preserving Privacy | p. 139 |
Preserving Privacy: Anonymity | p. 147 |
Preserving Privacy: User Tracking | p. 155 |
Preserving Privacy: Span Management | p. 163 |
Connecting Networks | p. 169 |
Connecting Networks: Networking Hardware | p. 179 |
Connecting Networks: Wireless Connections | p. 189 |
Connecting Networks: Network Lingo | p. 199 |
Hardening Networks | p. 209 |
Hardening Networks: Firewalls | p. 215 |
Hardening Networks: Network Address Translation | p. 229 |
Hardening Networks: Virtual Private Networks | p. 237 |
Hardening Networks: Traffic Shaping | p. 245 |
Storing Information | p. 253 |
Storing Information: Storage Media | p. 259 |
Storing Information: Local File Systems | p. 263 |
Storing Information: Network File Systems | p. 271 |
Storing Information: Databases | p. 277 |
Hiding Information | p. 285 |
Hiding Information: Cryptography | p. 291 |
Hiding Information: Cryptanalysis | p. 301 |
Hiding Information: Steganography | p. 305 |
Accessing Information | p. 313 |
Accessing Information: Client-Server Architecture | p. 319 |
Accessing Information: Internet Services | p. 327 |
Accessing Information: Remote Access | p. 337 |
Accessing Information: Peer-to-Peer Networking | p. 345 |
Ensuring Availability | p. 353 |
Ensuring Availability: RAID | p. 359 |
Ensuring Availability: Clustering | p. 365 |
Ensuring Availability: Backup Systems | p. 371 |
Detecting Intrusions | p. 377 |
Detecting Intrusions: File Integrity | p. 383 |
Detecting Intrusions: Viruses and Trojans | p. 389 |
Detecting Intrusions: Network Scanners | p. 395 |
Detecting Intrusions: Network Sniffers | p. 399 |
Detecting Intrusions: Logging and Analysis | p. 405 |
Index | p. 411 |
Table of Contents provided by Blackwell. All Rights Reserved. |