did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071784351

Information Security: The Complete Reference, Second Edition

by
  • ISBN13:

    9780071784351

  • ISBN10:

    0071784357

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2013-04-24
  • Publisher: McGraw Hill

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $70.00 Save up to $24.50
  • Rent Book $45.50
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

This thorough update to the most authoritative volume available on network security covers the latest security standards and regulations. Network Security: The Complete Reference, Second Editionguides security practitioners through how to plan, implement, and maintain a secure network, protect confidential information, and ensure corporate networks are in compliance with the latest regulations. The book covers essential standards, such as ISO 27001, CoBIT, and SAS 70. Important legal regulations (and their context and relevance), such as Sarbanes-Oxley (SOX), SB 1386, SB 1841, FFIEC, Gramm-Leach-Bliley (GLB), and HIPAA are highlighted throughout where their relevance intersects with topicsenhancing this edition's value and practicality. This authoritative volume includes contributions from 30+ technical experts and leaders in the security industry. New chapters have been added on VoIP security, controlling application behavior, and operational security. The chapters covering system security, planning and response, and standards compliance have been extensively revised. The 37 chapters are divided into six parts. Part 1 covers the elements of network security foundations including policies, organization, and defense models. Part II covers access control, including security management, operational security, and data security. Part III gets into key network security aspects, including firewalls, virtual private networks, wireless security, VoIP security, and more. Part IV explains system security, focusing on security models, UNIX, Linux, and Windows Security. Part V covers application security, including J2EE, Windows .NET, database security, writing secure software, and more. Part VI explains planning and response, including disaster recovery, attacks and countermeasures, incident response, as well as legal, regulatory, and standards compliance. Network Security: The Complete Reference, Second Edition Now presents essential security standards and regulation information paired with related topics throughout the book, greatly enhancing ease-of-use and the ability to readily apply business recommendations Teaches end-to-end IT security concepts and techniques, complete with methodology, analysis, case examples, tips, and all the technical supporting details needed to suit an IT audience's requirements Spans from a beginner to advanced practitioner level Includes detailed updates on how to assure business compliance with IT standards and regulations, including ISO 27001, CoBIT, SAS 70, and SOX Offers completely updated coverage of Linux/UNIX, wireless, secure Windows, VPN, software development, and physical premises Contains comprehensive information on how to design an effective security defense model, develop and deploy computer, personnel, and physical security policies, design and manage authentication and authorization methods, and much more

Table of Contents

Part 1: Network Security Foundations
1 Overview
2 Risk Analysis and Defense Models
3 Security Policies
4 Security Organization

Part 2: Access Control
5 Security Management
6 Physical Security
7 Operational Security
8 Authentication and Authorization Controls
9 Data Security

Part 3: Network Security
10 Network Design Considerations
11 Network Device Security
12 Firewalls
13 Virtual Private Networks
14 Wireless Network Security
15 Intrusion Detection Systems
16 Integrity and Availability
17 Network Role-Based Security
18 Voice-Over-IP (VOIP) Security

Part 4: System Security
19 Operating System Security Models
20 Unix Security
21 Linux Security
22 Windows Security

Part 5: Application Security
23 Principles of Application Security
24 Controlling Application Behavior
25 Writing Secure Software
26 J2EE Security
27 Windows .NET Security
28 Database Security

Part 6: Planning and Response
29 Disaster Recovery and Business Continuity
30 Attacks and Countermeasures
31 Incident Response and Forensic Analysis
32 Legal, Regulatory, and Standards Compliance

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program