ISBN 9780764573972,Network Security Bible

Network Security Bible



John Wiley & Sons

Publication Year 2005

ISBN 9780764573972

ISBN-10 0764573977


Number of Pages 694 Pages
Language (English)

Medicine: general issues

If you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how to evaluate your security. You'll even get guidance in making the case for enhanced security to leaders of the organization. Whether you're learning the basics or seeking more detailed knowledge, you'll find this reference invaluable.

Inside, you'll find complete coverage of network security issues Identify and apply best practices for Windows(R), UNIX(R), and Linux(R) systems Understand the fundamental tenets of information system security, especially confidentiality, integrity, and availability (CIA) Set up appropriate security policies and manage implementation Learn to secure Web browsers, protect corporate portals, and implement secure e-commerce applications Configure e-mail systems and set up different types of servers for safer access Choose the best security approach for various network protocols, particularly OSI and TCP Explore the special security issues of wireless networks Examine cryptography and steganography and how they can support communications security Test your system and interpret the results

A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness