Skip to content

Network Security Illustrated

Best in textbook rentals since 2012!

ISBN-10: 0071415041

ISBN-13: 9780071415040

Edition: 2004

Authors: Jason Albanese, Wes Sonnenreich

List price: $39.95
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

A big picture approach to network security, this tutorial shows network administrators and managers all their options and helps them make the best decision for their budgets.
Customers also bought

Book details

List price: $39.95
Copyright year: 2004
Publisher: McGraw-Hill Professional Publishing
Publication date: 9/26/2003
Binding: Paperback
Pages: 423
Size: 7.25" wide x 8.75" long x 1.25" tall
Weight: 1.628
Language: English

Introduction
Acknowledgments
Managing Securityp. 1
Managing Security: The Security Assessmentp. 13
Managing Security: Systems and Network Monitoringp. 19
Outsourcing Optionsp. 27
Outsourcing Options: Outsourcing Network Monitoringp. 39
Outsourcing Options: Outsourcing Disaster Preventionp. 47
Outsourcing Options: Outsourcing Proactive Securityp. 55
Reserving Rightsp. 63
Reserving Rights: Digital Rights Managementp. 79
Reserving Rights: Copy Protectionp. 87
Determining Identityp. 95
Determining Identity: Passwordsp. 105
Determining Identity: Digital Certificatesp. 115
Determining Identity: Portable, Identifiersp. 123
Determining Identity: Biometricsp. 129
Preserving Privacyp. 139
Preserving Privacy: Anonymityp. 147
Preserving Privacy: User Trackingp. 155
Preserving Privacy: Span Managementp. 163
Connecting Networksp. 169
Connecting Networks: Networking Hardwarep. 179
Connecting Networks: Wireless Connectionsp. 189
Connecting Networks: Network Lingop. 199
Hardening Networksp. 209
Hardening Networks: Firewallsp. 215
Hardening Networks: Network Address Translationp. 229
Hardening Networks: Virtual Private Networksp. 237
Hardening Networks: Traffic Shapingp. 245
Storing Informationp. 253
Storing Information: Storage Mediap. 259
Storing Information: Local File Systemsp. 263
Storing Information: Network File Systemsp. 271
Storing Information: Databasesp. 277
Hiding Informationp. 285
Hiding Information: Cryptographyp. 291
Hiding Information: Cryptanalysisp. 301
Hiding Information: Steganographyp. 305
Accessing Informationp. 313
Accessing Information: Client-Server Architecturep. 319
Accessing Information: Internet Servicesp. 327
Accessing Information: Remote Accessp. 337
Accessing Information: Peer-to-Peer Networkingp. 345
Ensuring Availabilityp. 353
Ensuring Availability: RAIDp. 359
Ensuring Availability: Clusteringp. 365
Ensuring Availability: Backup Systemsp. 371
Detecting Intrusionsp. 377
Detecting Intrusions: File Integrityp. 383
Detecting Intrusions: Viruses and Trojansp. 389
Detecting Intrusions: Network Scannersp. 395
Detecting Intrusions: Network Sniffersp. 399
Detecting Intrusions: Logging and Analysisp. 405
Indexp. 411
Table of Contents provided by Blackwell. All Rights Reserved.