Normal view MARC view ISBD view

Network security illustrated / Jason Albanese, Wes Sonnenreich.

By: Albanese, Jason.
Contributor(s): Sonnenreich, Wes, 1974-.
Publisher: New York : McGraw-Hill, c2004Description: xxii, 423 p. : ill. ; 24 cm.ISBN: 0071415041 (pbk.).Subject(s): Computer networks -- Security measuresDDC classification: 005.8
Contents:
- Pt. 8. Storing information. 22. Storing information : storage media. 23. Storing information: local file systems. 24. Storing information : network file systems. 25. Storing information: databases. - Pt. 9. Hiding information. 26. Hiding information : cryptography. 27. Hiding information: cryptanalysis. 28. Hiding information: steganography. - Pt. 10. Accessing information. 29. Accessing information : client-server architecture. 30. Accessing information: internet services. 31. Accessing information: remote access. 32. Accessing information: peer-to-peer networking. - Pt. 11. Ensuring availability. 33.Ensuring availability : raid. 34. Ensuring availability : clustering. 35. Ensuring availability : backup systems. - Pt. 12. Decting intrusions. 36. Detecting intrusions : file integrity. 37. Detecting intrusions : viruses and trojans. 38. Detecting intrusions : network scanners. 39. Detecting intrusions : network sniffers. 40. Detecting intrusions : logging and analysis. - Index.
Introduction. - Acknowledgements. - Pt. 1. Managing security. 1. Managing security : the security assessment. 2. Managing security : systems and network monitoring. - Pt. 2. Outsourcing options. 3. Outsourcing options : outsourcing network monitoring. 4. Outsourcing options : outsourcing disaster preventions. 5. Outsourcing options : outsourcing proactive security. - Pt. 3. Reserving rights. 6. Reserving rights : digital rights management. 7. Reserve rights : copy protection. - Pt. 4. Determining identity. 8. Determining identity : passwords. 9. Determining identity : digial certificates. 10. Determining identity : portable identifiers. 11. Determining identity : Biometrics. - Pt. 5. Preserving privacy. 12. Preserving Privacy: anonymity. 13. Preserving Privacy: User tracking. 14. Preserving Privacy : Spam management. - Pt. 6. Connecting networks. 15. Connecting networks : Networking hardware. 16. Connecting networks: Wireless connections. 17. Connecting networks : network lingo. - Pt. 7. Hardenig hetworks. 18. Hardening networks : firewalls. 19. Hardening networks : Network address translation. 20. Hardening networks : virtual private networks. 21. Hardening networks : traffic shaping.
Item type Current location Call number Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU
005.8 ALB (Browse shelf) 1 Available SOCIT,15009,03,GR 5000034409

Includes index.

- Pt. 8. Storing information. 22. Storing information : storage media. 23. Storing information: local file systems. 24. Storing information : network file systems. 25. Storing information: databases. - Pt. 9. Hiding information. 26. Hiding information : cryptography. 27. Hiding information: cryptanalysis. 28. Hiding information: steganography. - Pt. 10. Accessing information. 29. Accessing information : client-server architecture. 30. Accessing information: internet services. 31. Accessing information: remote access. 32. Accessing information: peer-to-peer networking. - Pt. 11. Ensuring availability. 33.Ensuring availability : raid. 34. Ensuring availability : clustering. 35. Ensuring availability : backup systems. - Pt. 12. Decting intrusions. 36. Detecting intrusions : file integrity. 37. Detecting intrusions : viruses and trojans. 38. Detecting intrusions : network scanners. 39. Detecting intrusions : network sniffers. 40. Detecting intrusions : logging and analysis. - Index.

Introduction. - Acknowledgements. - Pt. 1. Managing security. 1. Managing security : the security assessment. 2. Managing security : systems and network monitoring. - Pt. 2. Outsourcing options. 3. Outsourcing options : outsourcing network monitoring. 4. Outsourcing options : outsourcing disaster preventions. 5. Outsourcing options : outsourcing proactive security. - Pt. 3. Reserving rights. 6. Reserving rights : digital rights management. 7. Reserve rights : copy protection. - Pt. 4. Determining identity. 8. Determining identity : passwords. 9. Determining identity : digial certificates. 10. Determining identity : portable identifiers. 11. Determining identity : Biometrics. - Pt. 5. Preserving privacy. 12. Preserving Privacy: anonymity. 13. Preserving Privacy: User tracking. 14. Preserving Privacy : Spam management. - Pt. 6. Connecting networks. 15. Connecting networks : Networking hardware. 16. Connecting networks: Wireless connections. 17. Connecting networks : network lingo. - Pt. 7. Hardenig hetworks. 18. Hardening networks : firewalls. 19. Hardening networks : Network address translation. 20. Hardening networks : virtual private networks. 21. Hardening networks : traffic shaping.