Skip to content

Internet Security Guidebook From Planning to Deployment

Best in textbook rentals since 2012!

ISBN-10: 0122374711

ISBN-13: 9780122374715

Edition: 2001

Authors: Juanita Ellis, Tim Speed

List price: $78.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping…    
Customers also bought

Book details

List price: $78.95
Copyright year: 2001
Publisher: Elsevier Science & Technology
Publication date: 2/7/2001
Binding: Paperback
Pages: 320
Size: 7.36" wide x 9.25" long x 0.34" tall
Weight: 1.518

Juanita Ellis has been at the forefront in working with corporations in the areas of convergence, computer Security and e-business. Some of these companies include Sony, JCPenney, SWBell, Boeing, Xerox, Bell Atlantic, MCI, Citibank and Toyota. Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet…    

Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer. He and Juanita Ellis are the co-authors of books on Internet security and e-business.

Foreword
Preface
Acknowledgments
Copyright Notices and Statements
Introduction: Who is Knocking at the Door?
Let's Do Business
Security Components
Do You Have a Process?
The Cost of Security
Security Review
Review the Business
What Is a Trusted Network?
Initial Risk Analysis
The Policy
Implementation and Feedback
Cryptography
History
Key Types
RSA--Public and Private Key
PKI and Business Solutions
Secure Networks
TCP/IP and OSI
Port of Call (Let's Go on a Cruise)
Denial-of-Service Attacks
Virtual Private Networks
Secure Sockets Layer (SSL)
Protecting Your Intranet from the Extranet and Internet
So Many Choices! I'll Get One of Each!
Firewall Product Functional Summaries
Firewall Buyer's Assessment Form
Firewall Vendors: Picking the Products That Are Right for You
Authentication
The Basics
Authentication
Authorization
Smart Cards
E-Commerce--Public Key Infrastructure (PKI)
PKI and You
X.509
Certificate Authority
Certification Practice Statement
Certificate Revocation List
Key Recovery
Lightweight Directory Access Protocol (LDAP)
Public Key Cryptography Standards
Public Key Infrastructure (X.509) Standards
Messaging Security
Safe Communication--Messaging
Getting Killed with Junk Mail
Keep It Running
What Are We Doing Here?
Risk Analysis
Where Are the Threats?
Technology Security Review
Control Directory and Environmental Risk Table
Competitive Asset
Let's Make the Plans
Security Plans, Policies, Procedures
The Corporate Security Policy Document
Physical Security Policy
Network Security Policy
Acceptable Use Policy
We Have Been Hacked! Oh, the Humanity!
Incident Handling
The Total Package Specific Steps
Putting It All Together
The Plan
Sample Plan to Roll Out PKI
Security Tools
Tools
Other Tool URLs
The CERT Report
CERT Coordination Center Incident Reporting Guidelines
CERT/CC Contact Information
CERT Coordination Center Windows NT Intruder Detection Checklist
CERT/CC Contact Information
Glossary
References
LDAP Standards RFCs
New Standard Adoption RFCs
PKIX Standards RFCs
Privacy Enhanced Mail and Cryptography (PEM) RFCs
Index