Thinking security : stopping next year's hackers / Steven M. Bellovin.

By: Bellovin, Steven M [author.]Material type: TextTextSeries: Addison-Wesley professional computing series: Publisher: New York : Addison-Wesley, [2016]Description: xv, 381 pages ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9780134277547; 0134277546; 9780134278230; 0134278232Subject(s): Computer networks -- Security measures | Computer security | Computer networks -- Security measures | Computer securityDDC classification: 658.4/78 LOC classification: TK5105.59 | .B45 2016
Contents:
Defining the problem. Introduction -- Thinking about security -- Threat models -- Technologies. Antivirus software -- Firewalls and intrusion detection systems -- Cryptography and VPNs -- Passwords and authentication -- PKI: Public Key Infrastructures -- Wireless access -- Clouds and virtualization -- Secure operations. Building secure systems -- Selecting software -- Keeping software up to date -- People -- System administration -- Security process -- The future. Case studies --Doing security properly.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
TK5105.59 .B45 2016 (Browse shelf (Opens below)) 1 Available STACKS 51952000202967
Books Books Main Library
TK5105.59 .B45 2016 (Browse shelf (Opens below)) 1 Available STACKS 51952000202974

Includes bibliographical references (pages 317-354) and index.

Defining the problem. Introduction -- Thinking about security -- Threat models -- Technologies. Antivirus software -- Firewalls and intrusion detection systems -- Cryptography and VPNs -- Passwords and authentication -- PKI: Public Key Infrastructures -- Wireless access -- Clouds and virtualization -- Secure operations. Building secure systems -- Selecting software -- Keeping software up to date -- People -- System administration -- Security process -- The future. Case studies --Doing security properly.

1 2

There are no comments on this title.

to post a comment.