Conte aos seus amigos sobre este item:
Practical Internet Security Softcover reprint of hardcover 1st ed. 2007 edition
John R. Vacca
Practical Internet Security Softcover reprint of hardcover 1st ed. 2007 edition
John R. Vacca
Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems. Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet.
Marc Notes: Originally published: 2006.; This work reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. It provides the knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. Description for Sales People: As organizations increase their system links and exposure to customers, competitors, browsers, and hackers, web professionals have to be trained in techniques for effectively protecting their sites from internal and external threats. This book reveals how the internet is paving the way for secure communications within organizations and on the public internet. It provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing web communications and sites. Table of Contents: Dedication -- Acknowledgements -- Foreword -- Preface -- Part I. Introduction to Internet Security -- Chapter 1. Internet Technologies -- Chapter 2. Basic Security Issues -- Part II. Establishing Your Organization's Security -- Chapter 3. Real Threats That Impact Security -- Chapter 4. A Security Policy: The Foundation of Your Protection -- Part III. Developing Your Security Policy -- Chapter 5. Steps To Take Now -- Chapter 6. Responding To Attacks -- Part IV. Securing The Web Client -- Chapter 7. Threats and Vulnerabilities -- Chapter 8. Protecting Your Web Browser -- Part V. Network Interconnections: A Majorpoint of Vulnerability -- Chapter 9. Basic Operating System and TCP/IP Concepts -- Chapter 10. Early System Security Improvements -- Part VI. Deterring Masqueraders and Ensuring Authenticity -- Chapter 11. Impersonating Users -- Chapter 12. How Masqueraders Infiltrate a System -- Chapter 13. Holding Your Defensive Line -- Part VII. Preventing Eavesdropping to Protect Your Privacy -- Chapter 14. Unauthorized Listening and Looking -- Chapter 15. Countering Or Not Countering the Eavesdropper: That's the Question? -- Part VIII. Thwarting Counterfeiters and Forgery to Retain Integrity -- Chapter 16. The Forger's Arsenal -- Chapter 17. Shielding your Assets -- Part IX. Avoiding Disruption of Service to Maintain Availability -- Chapter 18. Denial-Of-Service Attacks -- Chapter 19. Constructing Your Bastions -- Chapter 20. The Importance of Firewalls -- Part X. Configuring Operating System and Network Security -- Chapter 21. Operating Systems That Pose Security Risks -- Chapter 22. Network Security -- Part XI. Enhancing Web Server Security -- Chapter 23. Controlling Access -- Chapter 24. Extended Web Site Security Functionality -- Chapter 25. Securing Web Communications With SSL VPNS -- Part XII. Issuing and Managing Certificates -- Chapter 26. Why Digital Certificates are Used -- Chapter 27. Certificate Authorities -- Chapter 28. Trusting SSL CAs in Servers and Browsers -- Part XIII. Firewalls and Firewall Topologies -- Chapter 29. Protecting Servers and Clients with Firewalls -- Chapter 30. Choosing the Right Firewall -- Chapter 31. Firewall Topologies -- Chapter 32. Selecting Firewall Security Topology Policy -- Part XIV. Security Management Solutions and Future Directions -- Chapter 33. Identifying and Responding to Security Violations -- Chapter 34. Real-Time Monitoring and Auditing -- Chapter 35. Limiting Damage -- Chapter 36. Keeping Up to Date on New Threats -- Chapter 37. Emerging Technologies -- Chapter 38. Summary, Conclusions and Recommendations -- Part XV. Appendices -- Appendix A. Configuring Internet Authentication Service on Microsoft Windows 2003 Server Windows 2003/Enhanced -- Appendix B. Internet Security Management, Resiliency and Security -- Appendix C. List of Top Internet Security Implementation and Deployment Companies -- Appendix D. List of Internet Security Products -- Appendix E. List of Internet Security Standards -- Appendix F. List of Miscellaneous Internet Security Resources -- Appendix G. Glossary -- Index. Publisher Marketing: As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems. Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.
Contributor Bio: Vacca, John R John Vacca resides in Ohio and has served as a computer security official with NASA. He has written over twenty books on computer-related topics, including Electronic Commerce 3/E.
Mídia | Livros Paperback Book (Livro de capa flexível e brochura) |
Lançado | 4 de novembro de 2010 |
ISBN13 | 9781441942692 |
Editoras | Springer-Verlag New York Inc. |
Páginas | 536 |
Dimensões | 178 × 235 × 33 mm · 1,02 kg |
Mais por John R. Vacca
Ver tudo de John R. Vacca ( por exemplo Paperback Book , Hardcover Book e Book )