Aller au contenu
Library Home
Start Over
Research Databases
E-Journals
Exemplaires mis en réserve pour un cours
Library Home
Connexion
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Langue
Library Catalog
Tous les champs
Titre
Auteur
Sujet
Cote
ISBN/ISSN
Rechercher
Recherche avancée
|
Parcourir
|
Astuces pour la recherche
Network and system security /
Citer
Envoyer par SMS
Envoyer par courriel
Imprimer
Exporter les notices
Exporter vers RefWorks
Exporter vers EndNoteWeb
Exporter vers EndNote
Ajouter aux favoris
Permalien
Network and system security / edited by John R. Vacca.
Enregistré dans:
Détails bibliographiques
Autres auteurs:
Vacca, John R.
Format:
eBook
Langue:
English
Publié:
Amsterdam ; Boston :
Syngress,
2014.
Édition:
Second edition
Sujets:
Computer networks
>
Security measures.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Security
>
General.
Computer networks
>
Security measures
Accès en ligne:
Click for online access
Exemplaires
Description
Table des matières
Documents similaires
Affichage MARC
Table des matières:
Machine generated contents note: 1. Detecting System Intrusions / Almantas Kakareka
1. Introduction
2. Monitoring Key Files in the System
3. Security Objectives
4.0day Attacks
5. Good Known State
6. Rootkits
7. Low Hanging Fruit
8. Antivirus Software
9. Homegrown Intrusion Detection
10. Full-Packet Capture Devices
11. Out-of-Band Attack Vectors
12. Security Awareness Training
13. Data Correlation
14. SIEM
15. Other Weird Stuff on the System
16. Detection
17.Network-Based Detection of System Intrusions (DSIs)
18. Summary
Chapter Review Questions/Exercises
Exercise
References
2. Preventing System Intrusions / Michael West
1. So, What is an Intrusion?
2. Sobering Numbers
3. Know Your Enemy: Hackers versus Crackers
4. Motives
5. The Crackers' Tools of the Trade
6. Bots
7. Symptoms of Intrusions
8. What Can You Do?
9. Security Policies
10. Risk Analysis
11. Tools of Your Trade
12. Controlling User Access
13. Intrusion Prevention Capabilities
14. Summary
Chapter Review Questions/Exercises
Exercise
3. Guarding Against Network Intrusions / Patrick J. Walsh
1. Traditional Reconnaissance and Attacks
2. Malicious Software
3. Defense in Depth
4. Preventive Measures
5. Intrusion Monitoring and Detection
6. Reactive Measures
7.Network-Based Intrusion Protection
8. Summary
Chapter Review Questions/Exercises
Exercise
4. Securing Cloud Computing Systems / Cem Gurkok
1. Cloud Computing Essentials: Examining the Cloud Layers
2. Software as a Service (SaaS): Managing Risks in the Cloud
3. Platform as a Service (PaaS): Securing the Platform
4. Infrastructure as a Service (IaaS)
5. Leveraging Provider-Specific Security Options
6. Achieving Security in a Private Cloud
7. Meeting Compliance Requirements
8. Preparing for Disaster Recovery
9. Summary
Chapter Review Questions/Exercises
Exercise
References
5. Unix and Linux Security / Gerald Beuchelt
1. Unix and Security
2. Basic Unix Security Overview
3. Achieving Unix Security
4. Protecting User Accounts and Strengthening Authentication
5. Limiting Superuser Privileges
6. Securing Local and Network File Systems
7.Network Configuration
8. Improving the Security of Linux and Unix Systems
9. Additional Resources
10. Summary
Chapter Review Questions/Exercises
Exercise
6. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana
1. Introduction to Linux and Unix
2. Hardening Linux and Unix
3. Proactive Defense for Linux and Unix
4. Summary
Chapter Review Questions/Exercises
Exercise
7. Internet Security / Jesse Walker
1. Internet Protocol Architecture
2. An Internet Threat Model
3. Defending against Attacks on the Internet
4. Internet Security Checklist
5. Summary
Chapter Review Questions/Exercises
Exercise
8. Intranet Security / Bill Mansoor
1. Smartphones and Tablets in the Intranet
2. Security Considerations
3. Plugging the Gaps: NAC and Access Control
4. Measuring Risk: Audits
5. Guardian at the Gate: Authentication and Encryption
6. Wireless Network Security
7. Shielding the Wire: Network Protection
8. Weakest Link in Security: User Training
9. Documenting the Network: Change Management
10. Rehearse the Inevitable: Disaster Recovery
11. Controlling Hazards: Physical and Environmental Protection
12. Know Your Users: Personnel Security
13. Protecting Data Flow: Information and System Integrity
14. Security Assessments
15. Risk Assessments
16. Intranet Security Implementation Process Checklist
17. Summary
Chapter Review Questions/Exercises
Exercise
9. Local Area Network Security / Dr. Pramod Pandya
1. Identify Network Threats
2. Establish Network Access Controls
3. Risk Assessment
4. Listing Network Resources
5. Threats
6. Security Policies
7. The Incident-Handling Process
8. Secure Design Through Network Access Controls
9. IDS Defined
10. NIDS: Scope and Limitations
11.A Practical Illustration of NIDS
12. Firewalls
13. Dynamic NAT Configuration
14. The Perimeter
15. Access List Details
16. Types of Firewalls
17. Packet Filtering: IP Filtering Routers
18. Application-Layer Firewalls: Proxy Servers
19. Stateful Inspection Firewalls
20. NIDS Complements Firewalls
21. Monitor and Analyze System Activities
22. Signature Analysis
23. Statistical Analysis
24. Signature Algorithms
25. Local Area Network Security Countermeasures Implementation Checklist
26. Summary
Chapter Review Questions/Exercises
Exercise
10. Wireless Network Security / Hongbing Cheng
1. Cellular Networks
2. Wireless Ad hoc Networks
3. Security Protocols
4. WEP
5. Secure Routing
6. ARAN
7. SLSP
8. Key Establishment
9. ING
10. Management Countermeasures
11. Summary
Chapter Review Questions/Exercises
Exercise
References
11. Cellular Network Security / Kameswari Kotapati
1. Introduction
2. Overview of Cellular Networks
3. The State of the Art of Cellular Network Security
4. Cellular Network Attack Taxonomy
5. Cellular Network Vulnerability Analysis
6. Summary
Chapter Review Questions/Exercises
Exercise
References
12. Rfid Security / Hongbing Cheng
1. RFID Introduction
2. RFID Challenges
3. RFID Protections
4. Summary
Chapter Review Questions/Exercises
Exercise
References
13. Optical Wireless Security / Scott R. Ellis
1. Optical Wireless Systems Overview
2. Deployment Architectures
3. High Bandwidth
4. Low Cost
5. Implementation
6. Surface Area
7. Summary
Chapter Review Questions/Exercises
Exercise.
Documents similaires
Network and security issues for internet mobile entertainment.
Publié: (2004)
Network security JumpStart
par: Strebe, Matthew
Publié: (2002)
Security sage's guide to hardening the network infrastructure
Publié: (2004)
Secure computer and network systems : modeling, analysis and design
par: Ye, Nong, 1964-
Publié: (2008)
Cisco security professional's guide to secure intrusion detection systems
Publié: (2003)