Network Security: The Complete Reference

Mark Rhodes-Ousley, Roberta Bragg, Keith Strassberg

  • 出版商: McGraw-Hill Education
  • 出版日期: 2003-11-17
  • 售價: $2,530
  • 貴賓價: 9.5$2,404
  • 語言: 英文
  • 頁數: 896
  • 裝訂: Paperback
  • ISBN: 0072226978
  • ISBN-13: 9780072226973
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

 

Summary

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.

The Most Authoritative Volume Available on Network Security

Includes a Security Dictionary and contributions from topical experts!

The solution to todays computer system security ills will only be solved when organizations obtain and implement a network security program. This comprehensive resource provides all the information necessary to formulate strategies to reach that goal. Learn to plan, implement, and maintain a secure network, and protect confidential information such as customer lists, credit card numbers, and stockholder names, and addresses. Prevent the attack or theft of specialized information such as trade secrets, formulas, production details, and other intellectual property. Network Security: The Complete Reference provides critical strategies, concepts, techniques, and solutions to keep your network system secure.

  • Learn what it takes to build a solid security architecture
  • Manage and control all access points to your digital data
  • Anticipate incidents using risk analysis, threat definition, and vulnerability assessment
  • Secure confidentiality, integrity, privacy, and availability
  • Understand how HIPAA, Gramm-Leach-Bliley and other security legislation affects you
  • Learn about a California law that requires compliance from all organizations, no matter what state they reside in

Technical Experts:

  • Dr. Nick Efford & Steve Wright, Windows .NET Security
  • Ken Pfeil, Physical Security
  • Ben Rothke, Operating System Security
  • Roger A. Grimes, Intrusion Detection
  • Anil Desai & Rob Kraft, Database Security
  • Ole Drews Jensen, Router & Device Security
  • Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
  • Michael Howard, Secure Software
  • Thaddeus Fortenberry & Eric Maiwald, VPN Security
  • Michael ODea, Windows Security
  • Brian Buege, Michael Judd & Jim Keogh, J2EE Security
  • Bernard Chapple, Disaster Recovery
  • Glen Carty & Steve Thomas, Novell Security
  • Christian Genetski & Curtis Karnow, Legal Issues
  • Curtis W. Rose, Incident Response & Computer Forensics
  • Thomas Knox & Robert Clugston, Linux/UNIX Security
  • Barak Weicheselbaum, Application Security

Table of Contents

  Part 1 Information Security Foundations
   Ch. 1: Introduction
   Ch. 2: Network Security Overview
   Ch. 3: Security Policy Development
  Part 2 Security Architecture Components
   Ch. 4: Network Security Architecture
   Ch. 5: Computer Security Architecture
   Ch. 6: Authentication and Authorization Methods
   Ch. 7: Application Security
   Ch. 8: Unix Security
   Ch. 9: Windows Security
   Ch. 10: Novell NetWare
   Ch. 11: J2EE Security
   Ch. 12: Database Security
   Ch. 13: Virtual Private Networks (VPNs)
   Ch. 14: Wireless Network Security
   Ch. 15: Data Security Architecture
  Part 3 Managing the Security Infrastructure
   Ch. 16: Security Management Architecture
   Ch. 17: Security Organization
   Ch. 18: Integrity and Availability Architecture
   Ch. 19: Disaster Recovery and Business Continuity
   Ch. 20: Incident Response and Forensic Analysis
   Ch. 21: Physical Security
  Part 4 Appendices
    Appendix A: Organization Certification, System Evaluation and Assurance
    Appendix B: HIPAA Preparation
    Appendix C: Gramm-Leach-Bliley Act (GLB) Preparation
    Appendix D: Dictionary of IT Security Terms

商品描述(中文翻譯)

摘要
本書教授端到端的網路安全概念和技術。包括如何設計全面的安全防禦模型的詳細資訊。此外,還揭示了如何制定和實施電腦、人員和物理安全政策,如何設計和管理身份驗證和授權方法等等。

最權威的網路安全專書
包括安全詞典和專家貢獻!

只有當組織獲得並實施網路安全計劃時,才能解決當今電腦系統安全問題。本書提供了制定策略達到這一目標所需的所有資訊。學習規劃、實施和維護安全網路,並保護機密資訊,如客戶名單、信用卡號碼和股東姓名和地址。防止專門資訊的攻擊或竊取,如商業機密、公式、生產細節和其他知識產權。《網路安全:完整參考資料》提供了關鍵的策略、概念、技術和解決方案,以保護您的網路系統安全。

- 學習建立堅固的安全架構所需的要素
- 管理和控制數位資料的所有存取點
- 使用風險分析、威脅定義和弱點評估預測事件
- 確保機密性、完整性、隱私和可用性
- 了解HIPAA、Gramm-Leach-Bliley和其他安全法規對您的影響
- 了解加州法律要求所有組織遵守,無論它們位於哪個州

技術專家:
- Dr. Nick Efford & Steve Wright, Windows .NET Security
- Ken Pfeil, Physical Security
- Ben Rothke, Operating System Security
- Roger A. Grimes, Intrusion Detection
- Anil Desai & Rob Kraft, Database Security
- Ole Drews Jensen, Router & Device Security
- Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
- Michael Howard, Secure Software
- Thaddeus Fortenberry & Eric Maiwald, VPN Security
- Michael ODea, Windows Security
- Brian Buege, Michael Judd & Jim Keogh, J2EE Security
- Bernard Chapple, Disaster Recovery
- Glen Carty & Steve Thomas, Novell Security
- Christian Genetski & Curtis Karnow, Legal Issues
- Curtis W. Rose, Incident Response & Computer Forensics
- Thomas Knox & Robert Clugston, Linux/UNIX Security
- Barak Weicheselbaum, Application Security

目錄
第一部分:資訊安全基礎
- 第1章:介紹
- 第2章:網路安全概述
- 第3章:安全政策制定

第二部分:安全架構組件
- 第4章:網路安全架構
- 第5章:電腦安全架構
- 第6章:身份驗證和授權方法
- 第7章:應用程式安全
- 第8章:Unix安全
- 第9章:Windows安全
- 第10章:Novell NetWare
- 第11章:J2EE安全
- 第12章:資料庫安全
- 第13章:虛擬私人網路(VPN)
- 第14章:無線網路安全
- 第15章:資料安全架構

第三部分:管理安全
- ...