Normal view MARC view ISBD view

The complete guide to internet security / Mark S. Merkow & James Breithaupt.

By: Merkow, Mark S.
Contributor(s): Breithaupt, Jim, 1955-.
Publisher: New York : American Management Association, c2000Description: x, 356 p. : ill. ; 24 cm.ISBN: 081447070X.Subject(s): Computer security | Internet -- Security measuresDDC classification: 005.8
Contents:
Acknowledgments. - 1. Building a Foundation for Information Security. - 2. The Fundamental Elements of Security. - 3. Vulnerabilities to Internet-Attached Networks. - 4. Hacking Isn't beyond the Corporate Perimeter. - 5. Peeking inside a Hacker's Toolbox. - 6. Instrumental Effects for Security Assurance. - 7. Security Technologies. - 8. Physical Security Control. - 9. Logical Access Control. - 10. Application Layer Security. - 11. An Introduction to Cryptography. - 12. Transport Layer Cryptography. - 13. Digital Signatures and PPK Cryptography. - 14. Key Management Considerations. - 15. Multifactor Access Controls Using Cryptography. - 16. Minding the Store for the Long Run. - Appendix A. A Sample Internet Security Policy. - Appendix B. Internet Bookmarks to Security-Related Sites. - Appendix C. Security and Security-Testing Specialists. - Appendix D. Suggested Readings. - Appendix E. Glossary of Terms. - Index.
Item type Current location Call number Copy number Status Notes Date due Barcode Remark
Main Collection TU External Storage-LCS
005.8 MER (Browse shelf) 1 Available ADTP, 93659 1000112274 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

Includes bibliographical references (p. 318-326) and index.

Acknowledgments. - 1. Building a Foundation for Information Security. - 2. The Fundamental Elements of Security. - 3. Vulnerabilities to Internet-Attached Networks. - 4. Hacking Isn't beyond the Corporate Perimeter. - 5. Peeking inside a Hacker's Toolbox. - 6. Instrumental Effects for Security Assurance. - 7. Security Technologies. - 8. Physical Security Control. - 9. Logical Access Control. - 10. Application Layer Security. - 11. An Introduction to Cryptography. - 12. Transport Layer Cryptography. - 13. Digital Signatures and PPK Cryptography. - 14. Key Management Considerations. - 15. Multifactor Access Controls Using Cryptography. - 16. Minding the Store for the Long Run. - Appendix A. A Sample Internet Security Policy. - Appendix B. Internet Bookmarks to Security-Related Sites. - Appendix C. Security and Security-Testing Specialists. - Appendix D. Suggested Readings. - Appendix E. Glossary of Terms. - Index.

Computer programming, programs & data