Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Network and system security /
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Network and system security / edited by John R. Vacca.
Saved in:
Bibliographic Details
Other Authors:
Vacca, John R.
Format:
eBook
Language:
English
Published:
Amsterdam ; Boston :
Syngress,
2014.
Edition:
Second edition
Subjects:
Computer networks
>
Security measures.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Security
>
General.
Computer networks
>
Security measures
Online Access:
Click for online access
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
Machine generated contents note: 1. Detecting System Intrusions / Almantas Kakareka
1. Introduction
2. Monitoring Key Files in the System
3. Security Objectives
4.0day Attacks
5. Good Known State
6. Rootkits
7. Low Hanging Fruit
8. Antivirus Software
9. Homegrown Intrusion Detection
10. Full-Packet Capture Devices
11. Out-of-Band Attack Vectors
12. Security Awareness Training
13. Data Correlation
14. SIEM
15. Other Weird Stuff on the System
16. Detection
17.Network-Based Detection of System Intrusions (DSIs)
18. Summary
Chapter Review Questions/Exercises
Exercise
References
2. Preventing System Intrusions / Michael West
1. So, What is an Intrusion?
2. Sobering Numbers
3. Know Your Enemy: Hackers versus Crackers
4. Motives
5. The Crackers' Tools of the Trade
6. Bots
7. Symptoms of Intrusions
8. What Can You Do?
9. Security Policies
10. Risk Analysis
11. Tools of Your Trade
12. Controlling User Access
13. Intrusion Prevention Capabilities
14. Summary
Chapter Review Questions/Exercises
Exercise
3. Guarding Against Network Intrusions / Patrick J. Walsh
1. Traditional Reconnaissance and Attacks
2. Malicious Software
3. Defense in Depth
4. Preventive Measures
5. Intrusion Monitoring and Detection
6. Reactive Measures
7.Network-Based Intrusion Protection
8. Summary
Chapter Review Questions/Exercises
Exercise
4. Securing Cloud Computing Systems / Cem Gurkok
1. Cloud Computing Essentials: Examining the Cloud Layers
2. Software as a Service (SaaS): Managing Risks in the Cloud
3. Platform as a Service (PaaS): Securing the Platform
4. Infrastructure as a Service (IaaS)
5. Leveraging Provider-Specific Security Options
6. Achieving Security in a Private Cloud
7. Meeting Compliance Requirements
8. Preparing for Disaster Recovery
9. Summary
Chapter Review Questions/Exercises
Exercise
References
5. Unix and Linux Security / Gerald Beuchelt
1. Unix and Security
2. Basic Unix Security Overview
3. Achieving Unix Security
4. Protecting User Accounts and Strengthening Authentication
5. Limiting Superuser Privileges
6. Securing Local and Network File Systems
7.Network Configuration
8. Improving the Security of Linux and Unix Systems
9. Additional Resources
10. Summary
Chapter Review Questions/Exercises
Exercise
6. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana
1. Introduction to Linux and Unix
2. Hardening Linux and Unix
3. Proactive Defense for Linux and Unix
4. Summary
Chapter Review Questions/Exercises
Exercise
7. Internet Security / Jesse Walker
1. Internet Protocol Architecture
2. An Internet Threat Model
3. Defending against Attacks on the Internet
4. Internet Security Checklist
5. Summary
Chapter Review Questions/Exercises
Exercise
8. Intranet Security / Bill Mansoor
1. Smartphones and Tablets in the Intranet
2. Security Considerations
3. Plugging the Gaps: NAC and Access Control
4. Measuring Risk: Audits
5. Guardian at the Gate: Authentication and Encryption
6. Wireless Network Security
7. Shielding the Wire: Network Protection
8. Weakest Link in Security: User Training
9. Documenting the Network: Change Management
10. Rehearse the Inevitable: Disaster Recovery
11. Controlling Hazards: Physical and Environmental Protection
12. Know Your Users: Personnel Security
13. Protecting Data Flow: Information and System Integrity
14. Security Assessments
15. Risk Assessments
16. Intranet Security Implementation Process Checklist
17. Summary
Chapter Review Questions/Exercises
Exercise
9. Local Area Network Security / Dr. Pramod Pandya
1. Identify Network Threats
2. Establish Network Access Controls
3. Risk Assessment
4. Listing Network Resources
5. Threats
6. Security Policies
7. The Incident-Handling Process
8. Secure Design Through Network Access Controls
9. IDS Defined
10. NIDS: Scope and Limitations
11.A Practical Illustration of NIDS
12. Firewalls
13. Dynamic NAT Configuration
14. The Perimeter
15. Access List Details
16. Types of Firewalls
17. Packet Filtering: IP Filtering Routers
18. Application-Layer Firewalls: Proxy Servers
19. Stateful Inspection Firewalls
20. NIDS Complements Firewalls
21. Monitor and Analyze System Activities
22. Signature Analysis
23. Statistical Analysis
24. Signature Algorithms
25. Local Area Network Security Countermeasures Implementation Checklist
26. Summary
Chapter Review Questions/Exercises
Exercise
10. Wireless Network Security / Hongbing Cheng
1. Cellular Networks
2. Wireless Ad hoc Networks
3. Security Protocols
4. WEP
5. Secure Routing
6. ARAN
7. SLSP
8. Key Establishment
9. ING
10. Management Countermeasures
11. Summary
Chapter Review Questions/Exercises
Exercise
References
11. Cellular Network Security / Kameswari Kotapati
1. Introduction
2. Overview of Cellular Networks
3. The State of the Art of Cellular Network Security
4. Cellular Network Attack Taxonomy
5. Cellular Network Vulnerability Analysis
6. Summary
Chapter Review Questions/Exercises
Exercise
References
12. Rfid Security / Hongbing Cheng
1. RFID Introduction
2. RFID Challenges
3. RFID Protections
4. Summary
Chapter Review Questions/Exercises
Exercise
References
13. Optical Wireless Security / Scott R. Ellis
1. Optical Wireless Systems Overview
2. Deployment Architectures
3. High Bandwidth
4. Low Cost
5. Implementation
6. Surface Area
7. Summary
Chapter Review Questions/Exercises
Exercise.
Similar Items
Network and security issues for internet mobile entertainment.
Published: (2004)
Network security JumpStart
by: Strebe, Matthew
Published: (2002)
Security sage's guide to hardening the network infrastructure
Published: (2004)
Secure computer and network systems : modeling, analysis and design
by: Ye, Nong, 1964-
Published: (2008)
Cisco security professional's guide to secure intrusion detection systems
Published: (2003)