Amazon cover image
Image from Amazon.com

Network security bible / Eric Cole, Ronald Krutz, James W. Conley

By: Cole, Eric | Krutz, Ronald | Conley, James WPublication details: New Delhi : Wiley, c2009. Edition: 2nd edDescription: xliv, 891 p. : ill. ; 23 cmISBN: 9788126523313DDC classification: 005.8 COL
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Part I: Network Security Landscape.
Chapter 1: State of Network Security.
Chapter 2: New Approaches to Cyber Security.
Chapter3: Interfacing with the Organization.
Part II: Security Principles and Practices.
Chapter 4: Information System Security Principles.
Chapter 5: Information System Security Management.
Chapter 6: Access Control.
Chapter 7: Attacks and Threats.
Part III: Operating Systems and Applications.
Chapter 8: Windows Security.
Chapter 9: UNIX and Linux Security.
Chapter 10: Web Browser and Client Security.
Chapter 11: Web Security.
Chapter 12: Electronic mail (E-mail) Security.
Chapter13: Domain Name System.
Chapter 14: Server Security.
Part IV: Network Security Fundamentals.
Chapter15: Network Protocols.
Chapter 16: Wireless Security.
Chapter17: Network Architecture Fundamentals.
Chapter18: Firewalls.
Chapter 19: Intrusion Detection/Prevention.
Part V: Communication.
Chapter 20: Secret Communication.
Chapter21: Covert Communication.
Chapter 22: Applications of Secure/Covert Communication.
Part VI: The Security Threat and Response.
Chapter23: Intrusion Detection and Response.
Chapter 25: Security Assessments, Testing, and Evaluation.
Part VII: Integrated Cyber Security.
Chapter 26: Validating Your Security.
Chapter27: Data Protection.
Chapter 28: Putting Everything Together.
Chapter29: The Future.
Includes index

There are no comments on this title.

to post a comment.