My Account Log in

2 options

Network security foundations / Matthew Strebe.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Strebe, Matthew.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Computer security.
Physical Description:
1 online resource (333 p.)
Edition:
1st ed.
Place of Publication:
San Francisco : SYBEX, c2004.
Language Note:
English
Summary:
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit
Contents:
Foundations Network Security; Front matter; Acknowledgments; Contents; Introduction; Chapter 1: Security Principles; Why Computers Aren't Secure; The History of Computer Security; -1945; 1945-1955; 1955-1965; 1965-1975; 1975-1985; 1985-1995; 1995-2005; 2005-; Security Concepts; Trust; Authentication; Chain of Authority; Accountability; Access Control; Terms to Know; Review Questions; Chapter 2: Understanding Hacking; What Is Hacking?; Types of Hackers; Security Experts; Script Kiddies; Underemployed Adult Hackers; Ideological Hackers; Criminal Hackers; Corporate Spies; Disgruntled Employees
Vectors That Hackers Exploit Direct Intrusion; Dial-Up; Internet; Wireless; Hacking Techniques; Target Selection; Information Gathering; Attacks; Terms to Know; Review Questions; Chapter 3: Encryption and Authentication; Encryption; Secret Key Encryption; One-Way Functions (Hashes); Public Key Encryption; Hybrid Cryptosystems; Authentication; Password Authentication; Session Authentication; Public Key Authentication; Certificate-Based Authentication; Biometric Authentication; Terms to Know; Review Questions; Chapter 4: Managing Security; Developing a Security Policy
Creating a Policy Requirements Outline Security Policy Best Practices; Implementing Security Policy; Applying Automated Policy; Human Security; Updating the Security Policy; The Security Cycle; Terms to Know; Review Questions; Chapter 5: Border Security; Principles of Border Security; Understanding Firewalls; Fundamental Firewall Functions; Firewall Privacy Services; Virtual Private Networks; Other Border Services; Selecting a Firewall; Terms to Know; Review Questions; Chapter 6: Virtual Private Networks; Virtual Private Networking Explained; IP Encapsulation; Cryptographic Authentication
Data Payload Encryption Characteristics of VPNs; Common VPN Implementations; IPSec; L2TP; PPTP; PPP/SSL or PPP/SSH; VPN Best Practices; Terms to Know; Review Questions; Chapter 7: Securing Remote and Home Users; The Remote Security Problem; Virtual Private Security Holes; Laptops; Protecting Remote Machines; VPN Connections; Data Protection and Reliability; Backups and Archiving; Protecting against Remote Users; Terms to Know; Review Questions; Chapter 8: Malware and Virus Protection; Understanding Malware; Understanding Viruses; Virus Protection; Prevention; Natural Immunity
Active Protection Understanding Worms and Trojan Horses; Protecting Against Worms; Implementing Virus Protection; Client Virus Protection; Server-Based Virus Protection; E-Mail Gateway Virus Protection; Firewall-Based Virus Protection; Enterprise Virus Protection; Terms to Know; Review Questions; Chapter 9: Creating Fault Tolerance; Causes for Loss; Human Error; Routine Failure Events; Crimes; Environmental Events; Fault Tolerance Measures; Backups; Uninterruptible Power Supplies (UPSs) and Power Generators; Redundant Array of Independent Disks (RAID); Permissions; Border Security; Auditing
Offsite Storage
Notes:
Description based upon print version of record.
Includes index.
ISBN:
9786610522484
9781280522482
1280522488
9780782151367
0782151361
9781417539611
1417539615
OCLC:
475992136

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account