The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. This book can be used in executive training programs, or by anyone interested in learning the practical side of IT security.
Table of Contents
1. DOS Commands 2. Windows Security ‘ 3. Web Security 4. Porn & Spam Filters 5. Monitoring Software 6. Password Auditors 7. Wireless 8. Security Readings 9. Information Gathering 10. Packet Sniffer 11. Port & Vulnerability Scanners 12. Honeypots and IDS 13. File Integrity Checkers & System Monitors 14. Alternate Data Streams 15. Data Recovery & Secure Deletion 16. Cryptography 17. Steganography 18. Forensics 19. Application Security 20. Linux Primer 21. Securing Web Servers 22. Utilities & Other 23. IT Security Distributions 24. Mobile Security Appendix A. Antivirus Appendix B. Software Links