TY - BOOK AU - Merkow,Mark S. AU - Breithaupt,Jim TI - The complete guide to internet security SN - 081447070X U1 - 005.8 PY - 2000/// CY - New York PB - American Management Association KW - Computer security KW - Internet KW - Security measures N1 - Includes bibliographical references (p. 318-326) and index; Acknowledgments. - 1. Building a Foundation for Information Security. - 2. The Fundamental Elements of Security. - 3. Vulnerabilities to Internet-Attached Networks. - 4. Hacking Isn't beyond the Corporate Perimeter. - 5. Peeking inside a Hacker's Toolbox. - 6. Instrumental Effects for Security Assurance. - 7. Security Technologies. - 8. Physical Security Control. - 9. Logical Access Control. - 10. Application Layer Security. - 11. An Introduction to Cryptography. - 12. Transport Layer Cryptography. - 13. Digital Signatures and PPK Cryptography. - 14. Key Management Considerations. - 15. Multifactor Access Controls Using Cryptography. - 16. Minding the Store for the Long Run. - Appendix A. A Sample Internet Security Policy. - Appendix B. Internet Bookmarks to Security-Related Sites. - Appendix C. Security and Security-Testing Specialists. - Appendix D. Suggested Readings. - Appendix E. Glossary of Terms. - Index ER -