The complete guide to internet security / Mark S. Merkow & James Breithaupt.
By: Merkow, Mark S.
Contributor(s): Breithaupt, Jim.
Publisher: New York : American Management Association, c2000Description: x, 356 p. : ill. ; 24 cm.ISBN: 081447070X.Subject(s): Computer security | Internet -- Security measuresDDC classification: 005.8Item type | Current location | Call number | Copy number | Status | Notes | Date due | Barcode | Remark |
---|---|---|---|---|---|---|---|---|
Main Collection | TU External Storage-LCS | 005.8 MER (Browse shelf) | 1 | Available | ADTP, 93659 | 1000112274 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 |
Includes bibliographical references (p. 318-326) and index.
Acknowledgments. - 1. Building a Foundation for Information Security. - 2. The Fundamental Elements of Security. - 3. Vulnerabilities to Internet-Attached Networks. - 4. Hacking Isn't beyond the Corporate Perimeter. - 5. Peeking inside a Hacker's Toolbox. - 6. Instrumental Effects for Security Assurance. - 7. Security Technologies. - 8. Physical Security Control. - 9. Logical Access Control. - 10. Application Layer Security. - 11. An Introduction to Cryptography. - 12. Transport Layer Cryptography. - 13. Digital Signatures and PPK Cryptography. - 14. Key Management Considerations. - 15. Multifactor Access Controls Using Cryptography. - 16. Minding the Store for the Long Run. - Appendix A. A Sample Internet Security Policy. - Appendix B. Internet Bookmarks to Security-Related Sites. - Appendix C. Security and Security-Testing Specialists. - Appendix D. Suggested Readings. - Appendix E. Glossary of Terms. - Index.
Computer programming, programs & data