did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780764589157

Network Security Bible

by ; ;
  • ISBN13:

    9780764589157

  • ISBN10:

    0764589156

  • Format: eBook
  • Copyright: 2005-01-01
  • Publisher: WILEY
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $39.99
We're Sorry.
No Options Available at This Time.

Summary

A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness

Author Biography

Eric Cole, PhD, has appeared as a security expert on CBS News, 60 Minutes, and CNN Headline News Ronald Krutz, PhD, is the founder of the Carnegie Mellon Research Institute Cybersecurity Center James W. Conley has been a security officer in the United States Navy and a senior security specialist on CIA development efforts

Table of Contents

Acknowledgments.
Introduction.
Part I: Security Principles and Practices.
Chapter 1: Information System Security Principles.
Chapter 2: Information System Security Management.
Chapter 3: Access Control Considerations.
Part II: Operating Systems and Applications.
Chapter 4: Windows Security.
Chapter 5: UNIX and Linux Security.
Chapter 6: Web Browser and Client Security.
Chapter 7: Web Security.
Chapter 8: E-mail Security.
Chapter 9: Domain Name System.
Chapter 10: Server Security.
Part III: Network Security Fundamentals.
Chapter 11: Network Protocols.
Chapter 12: Wireless Security.
Chapter 13: Network Architecture Fundamentals.
Part IV: Communications.
Chapter 14: Secret Communication.
Chapter 15: Covert Communication.
Chapter 16: Applications of Secure/Covert Communication.
Part V: The Security Threat and the Response.
Chapter 17: Intrusion Detection and Response.
Chapter 18: Security Assessments, Testing, and Evaluation.
Chapter 19: Putting Everything Together.
Index.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program