Network security : the complete reference / Roberta Bragg, Mark Rhodes-Ousley, Keith Strassberg ; with Brian Buege ... [et al.].
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | TK5105.59 .B725 2004 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000171454 | |
![]() |
Main Library | TK5105.59 .B725 2004 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000153443 |
Browsing Female Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
TK5105.585 .L45 2009 TCP/IP for dummies / | TK5105.59 .B36 2003 Linux security cookbook / | TK5105.59 .B45 2016 Thinking security : stopping next year's hackers / | TK5105.59 .B725 2004 Network security : the complete reference / | TK5105.59 .C365 2007 Data communications and network security / | TK5105.59 .C3655 2010 The management of network security : technology, design, and management control / | TK5105.59 .C52 2009 Security+ guide to network security fundamentals / |
Includes bibliographical references and index.
I. Network security foundations. Network security overview -- Risk analysis and defense models -- Security policy development -- Security organization -- II. Access control. Physical security -- Authentication and authorization controls -- Data security architecture -- Security management architecture -- III. Network architecture. Network design considerations -- Network device security -- Firewalls -- Virtual private network security -- Wireless network security -- Intrusion-detection systems -- Integrity and availability architecture -- Network role-based security -- IV. Operating system security. Operating system security models -- Common Unix vulnerabilities -- Linux security -- Windows security -- Novell security -- V. Application security. Principals of application security -- Writing secure software -- J2EE security -- Windows .NET security -- Database security -- VI. Response. Disaster recovery and business continuity -- Attacks and countermeasures -- Incident response and forensic analysis -- Legal issues: the laws affecting information security professionals.
Also issued online.
1 2
There are no comments on this title.