Vacca, John R.
Practical Internet Security
Part I.Introduction to Internet Security
1. Internet Technologies
2. Basic Security Issues
Part II.Establishing Your Organization’s Security
3. Real Threats That Impact Security
4. A Security Policy: The Foundation of Your Protection
Part III.Developing Your Security Policy
5. Steps to Take Now
6. Responding to Attacks
Part IV.Securing the Web Client
7. Threats and Vulnerabilities
8. Protecting Your Web Browser
Part V.Network Interconnections: A Majorpoint of Vulnerability
9. Basic Operating System and TCP/IP Concepts
10. Early System Security Improvements
Part VI.Deterring Masqueraders and Ensuring Authenticity
11. Impersonating Users
12. How Masqueraders Infiltrate a System
13. Holding Your Defensive Line
Part VII.Preventing Eavesdropping to Protect Your Privacy
14. Unauthorized Listening and Looking
15. Countering or not Countering the Eavesdropper: That’s the Question?
Part VIII.Thwarting Counterfeiters and Forgery to Retain Integrity
16. The Forger’s Arsenal
17. Shielding your Assets
Part IX.Avoiding Disruption of Service to Maintain Availability
18. Denial-of-Service Attacks
19. Constructing Your Bastions
20. The Importance of Firewalls
Part X.Configuring Operating System and Network Security
21. Operating Systems that Pose Security Risks
22. Network Security
Part XI.Enhancing Web Server Security
23. Controlling Access
24. Extended Web Site Security Functionality
25. Securing Web Communications with SSL VPNS
Part XII.Issuing and Managing Certificates
26. Why Digital Certificates are Used
27. Certificate Authorities
28. Trusting SSL CAs in Servers and Browsers
Part XIII.Firewalls and Firewall Topologies
29. Protecting Servers and Clients with Firewalls
30. Choosing the Right Firewall
31. Firewall Topologies
32. Selecting Firewall Security Topology Policy
Part XIV.Security Management Solutions and Future Directions
33. Identifying and Responding to Security Violations
34. Real-Time Monitoring and Auditing
35. Limiting Damage
36. Keeping Up to Date on New Threats
37. Emerging Technologies
38. Summary, Conclusions and Recommendations
DRM-restrictions
Printing: not available
Clipboard copying: not available
Avainsanat: COMPUTERS / Computer Science COM014000
- Tekijä(t)
- Vacca, John R.
- Julkaisija
- Springer
- Julkaisuvuosi
- 2007
- Kieli
- en
- Painos
- 1
- Kategoria
- Tietotekniikka, tietoliikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9780387298443