Thinking security : stopping next year's hackers / Steven M. Bellovin.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | TK5105.59 .B45 2016 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000202967 | |
![]() |
Main Library | TK5105.59 .B45 2016 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000202974 |
Browsing Main Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
TK5105.55 .S74 2012 TCP/IP illustrated. Volume 1, The protocols / | TK5105.585 .L45 2009 TCP/IP for dummies / | TK5105.59 .B36 2003 Linux security cookbook / | TK5105.59 .B45 2016 Thinking security : stopping next year's hackers / | TK5105.59 .B725 2004 Network security : the complete reference / | TK5105.59 .C365 2007 Data communications and network security / | TK5105.59 .C3655 2010 The management of network security : technology, design, and management control / |
Includes bibliographical references (pages 317-354) and index.
Defining the problem. Introduction -- Thinking about security -- Threat models -- Technologies. Antivirus software -- Firewalls and intrusion detection systems -- Cryptography and VPNs -- Passwords and authentication -- PKI: Public Key Infrastructures -- Wireless access -- Clouds and virtualization -- Secure operations. Building secure systems -- Selecting software -- Keeping software up to date -- People -- System administration -- Security process -- The future. Case studies --Doing security properly.
1 2
There are no comments on this title.