Network security bible / Eric Cole, Ronald Krutz, James W. Conley
Publication details: New Delhi : Wiley, c2009. Edition: 2nd edDescription: xliv, 891 p. : ill. ; 23 cmISBN: 9788126523313DDC classification: 005.8 COL| Item type | Current library | Home library | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|
English Staff Reference
|
Villa College Library | Villa College Library | 005.8 COL (Browse shelf(Opens below)) | Available | 299 |
Browsing Villa College Library shelves Close shelf browser (Hides shelf browser)
Part I: Network Security Landscape.
Chapter 1: State of Network Security.
Chapter 2: New Approaches to Cyber Security.
Chapter3: Interfacing with the Organization.
Part II: Security Principles and Practices.
Chapter 4: Information System Security Principles.
Chapter 5: Information System Security Management.
Chapter 6: Access Control.
Chapter 7: Attacks and Threats.
Part III: Operating Systems and Applications.
Chapter 8: Windows Security.
Chapter 9: UNIX and Linux Security.
Chapter 10: Web Browser and Client Security.
Chapter 11: Web Security.
Chapter 12: Electronic mail (E-mail) Security.
Chapter13: Domain Name System.
Chapter 14: Server Security.
Part IV: Network Security Fundamentals.
Chapter15: Network Protocols.
Chapter 16: Wireless Security.
Chapter17: Network Architecture Fundamentals.
Chapter18: Firewalls.
Chapter 19: Intrusion Detection/Prevention.
Part V: Communication.
Chapter 20: Secret Communication.
Chapter21: Covert Communication.
Chapter 22: Applications of Secure/Covert Communication.
Part VI: The Security Threat and Response.
Chapter23: Intrusion Detection and Response.
Chapter 25: Security Assessments, Testing, and Evaluation.
Part VII: Integrated Cyber Security.
Chapter 26: Validating Your Security.
Chapter27: Data Protection.
Chapter 28: Putting Everything Together.
Chapter29: The Future.
Includes index
English Staff Reference
There are no comments on this title.