Albanese, Jason.

Network security illustrated / Jason Albanese, Wes Sonnenreich. - New York : McGraw-Hill, c2004. - xxii, 423 p. : ill. ; 24 cm.

Includes index.

Pt. 8. Storing information. 22. Storing information : storage media. 23. Storing information: local file systems. 24. Storing information : network file systems. 25. Storing information: databases. - Pt. 9. Hiding information. 26. Hiding information : cryptography. 27. Hiding information: cryptanalysis. 28. Hiding information: steganography. - Pt. 10. Accessing information. 29. Accessing information : client-server architecture. 30. Accessing information: internet services. 31. Accessing information: remote access. 32. Accessing information: peer-to-peer networking. - Pt. 11. Ensuring availability. 33.Ensuring availability : raid. 34. Ensuring availability : clustering. 35. Ensuring availability : backup systems. - Pt. 12. Decting intrusions. 36. Detecting intrusions : file integrity. 37. Detecting intrusions : viruses and trojans. 38. Detecting intrusions : network scanners. 39. Detecting intrusions : network sniffers. 40. Detecting intrusions : logging and analysis. - Index. Introduction. - Acknowledgements. - Pt. 1. Managing security. 1. Managing security : the security assessment. 2. Managing security : systems and network monitoring. - Pt. 2. Outsourcing options. 3. Outsourcing options : outsourcing network monitoring. 4. Outsourcing options : outsourcing disaster preventions. 5. Outsourcing options : outsourcing proactive security. - Pt. 3. Reserving rights. 6. Reserving rights : digital rights management. 7. Reserve rights : copy protection. - Pt. 4. Determining identity. 8. Determining identity : passwords. 9. Determining identity : digial certificates. 10. Determining identity : portable identifiers. 11. Determining identity : Biometrics. - Pt. 5. Preserving privacy. 12. Preserving Privacy: anonymity. 13. Preserving Privacy: User tracking. 14. Preserving Privacy : Spam management. - Pt. 6. Connecting networks. 15. Connecting networks : Networking hardware. 16. Connecting networks: Wireless connections. 17. Connecting networks : network lingo. - Pt. 7. Hardenig hetworks. 18. Hardening networks : firewalls. 19. Hardening networks : Network address translation. 20. Hardening networks : virtual private networks. 21. Hardening networks : traffic shaping.

0071415041 (pbk.)


Computer networks--Security measures.

005.8 / ALB