
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Security | >> | Network Security Bib... |
ISBN
:
9788126505760
Publisher
:
Wiley India Pvt Ltd
Subject
:
Computer Security
Binding
:
Paperback
Year
:
2008
₹
449.0
₹
399.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
The Network Security Bible is organized into five sections: Security Principles and Practices, Operating Systems and Applications, Network Security, Communications and The Security Threat and Response. The flow of the material is intended to provide the reader with a foundation of information system security processes, and network security fundamentals. The book also addresses specifics of UNIX, Windows, Web, email, DNS, communications, and applications security. The material concludes with descriptions of information security threats, means to respond to those threats, and the latest methodologies for assessing and testing a network's security posture, including a la Hacking Exposed, very useful "secrets" to cost-effective and time-efficient network security operation. About The Author Eric Cole is chief scientist for The Sytex Group, has consulted for international banks, the Fortune 500. He made his mark working for the CIA for more than 7 years and as a member of the HoneyNet project. He is the highest-rated speaker on the SANS training circuit, has appeared as a security expert on CBS News, 60 Minutes and is a regular security expert for CNN Headline News. He is the author of Hiding in Plain Sight: Steganography and the Art of Covert Communication. Dr. Ronald Krutz is Sr. Information Security Researcher for The Sytex, Group. With 40+ years of experience in security, he is well known as the founder of Carnegie Mellon Research Institute Cybersecurity Center. He was a lead CISSP instructor, is a Distinguished Lecturer in the Center for Forensic Computer Investigation at U of New Haven, is an instructor at U of Pittsburgh-Electrical & Computer Engineering, and is the author of five Wiley security books, including CISSP Prep Guide. James W. Conley has 20+ years experience in security beginning as a Security Officer in the United States Navy and as a senior security specialist with the CIA. He has held Chief Information Officer (CIO), Director of Security, V.P. of Security Solutions, and President/CEO in private industry. Table Of Contents Acknowledgments Introduction Part I: Security Principles and Practices Information System Security Principles Information System Security Management Access Control Considerations Part II: Operating Systems and Applications Windows Security UNIX and Linux Security Web Browser and Client Security Web Security E-mail Security Domain Name System Server Security Part III: Network Security Fundamentals Network Protocols Wireless Security Network Architecture Fundamentals Part IV: Communications Secret Communication Covert Communication Applications of Secure/Covert Communication Part V: The Security Threat and the Response Intrusion Detection and Response Security Assessments, Testing, and Evaluation Putting Everything Together Index
Related Items
-
of
Information Security Management Handbook, Volume 2
Harold F. Tipton
Starts At
17164.0
19959.0
14% OFF
Foundations of Security: What Every Programmer Needs to Know
Christoph Kern
Starts At
314.0
349.0
10% OFF
Build Your Own Security Lab: A Field Guide For Network Testing (With CD)
Michael Gregg
Starts At
379.0
499.0
24% OFF
Cryptography And Security
C K Shyamala N Harini Dr T R Padmanabhan
Starts At
521.0
669.0
22% OFF
The Web Application Hacker's Handbook: Finding And Exploiting Security Flaws
Dafydd Stuttard
Starts At
615.0
799.0
23% OFF
Cloud Security: A Comprehensive Guide To Secure Cloud Computing
Russell Dean Vines Ronald L. Krutz
Starts At
580.0
699.0
17% OFF
Security, Rights, & Liabilities in E-Commerce
Jeffrey H. Matsuura
Starts At
7961.0
9257.0
14% OFF
Multicast and Group Security (Artech House Computer Security Series)
Thomas Hardjono
Starts At
7320.0
8512.0
14% OFF
Security In Wireless LANS And MANS (Artech House Computer Security)
Thomas Hardjono
Starts At
7961.0
9257.0
14% OFF
The German Enigma Cipher Machine: Beginnings, Success, and Ultimate Failure (Artech House Computer Security)
Brian J. Winkel
Starts At
8692.0
10108.0
14% OFF
Fuzzing for Software Security Testing and Quality Assurance
Ari Takanen
Starts At
5795.0
6739.0
14% OFF
Role Engineering for Enterprise Security Management
Coyne Edward J. Sr.
Starts At
7686.0
8938.0
14% OFF
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)
Steven Furnell
Starts At
8326.0
9682.0
14% OFF
Information Security: Design, Implementation, Measurement, and Compliance
Timothy P. Layton
Starts At
391.0
495.0
21% OFF