2 options
Network security foundations / Matthew Strebe.
- Format:
- Book
- Author/Creator:
- Strebe, Matthew.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Computer security.
- Physical Description:
- 1 online resource (333 p.)
- Edition:
- 1st ed.
- Place of Publication:
- San Francisco : SYBEX, c2004.
- Language Note:
- English
- Summary:
- The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit
- Contents:
- Foundations Network Security; Front matter; Acknowledgments; Contents; Introduction; Chapter 1: Security Principles; Why Computers Aren't Secure; The History of Computer Security; -1945; 1945-1955; 1955-1965; 1965-1975; 1975-1985; 1985-1995; 1995-2005; 2005-; Security Concepts; Trust; Authentication; Chain of Authority; Accountability; Access Control; Terms to Know; Review Questions; Chapter 2: Understanding Hacking; What Is Hacking?; Types of Hackers; Security Experts; Script Kiddies; Underemployed Adult Hackers; Ideological Hackers; Criminal Hackers; Corporate Spies; Disgruntled Employees
- Vectors That Hackers Exploit Direct Intrusion; Dial-Up; Internet; Wireless; Hacking Techniques; Target Selection; Information Gathering; Attacks; Terms to Know; Review Questions; Chapter 3: Encryption and Authentication; Encryption; Secret Key Encryption; One-Way Functions (Hashes); Public Key Encryption; Hybrid Cryptosystems; Authentication; Password Authentication; Session Authentication; Public Key Authentication; Certificate-Based Authentication; Biometric Authentication; Terms to Know; Review Questions; Chapter 4: Managing Security; Developing a Security Policy
- Creating a Policy Requirements Outline Security Policy Best Practices; Implementing Security Policy; Applying Automated Policy; Human Security; Updating the Security Policy; The Security Cycle; Terms to Know; Review Questions; Chapter 5: Border Security; Principles of Border Security; Understanding Firewalls; Fundamental Firewall Functions; Firewall Privacy Services; Virtual Private Networks; Other Border Services; Selecting a Firewall; Terms to Know; Review Questions; Chapter 6: Virtual Private Networks; Virtual Private Networking Explained; IP Encapsulation; Cryptographic Authentication
- Data Payload Encryption Characteristics of VPNs; Common VPN Implementations; IPSec; L2TP; PPTP; PPP/SSL or PPP/SSH; VPN Best Practices; Terms to Know; Review Questions; Chapter 7: Securing Remote and Home Users; The Remote Security Problem; Virtual Private Security Holes; Laptops; Protecting Remote Machines; VPN Connections; Data Protection and Reliability; Backups and Archiving; Protecting against Remote Users; Terms to Know; Review Questions; Chapter 8: Malware and Virus Protection; Understanding Malware; Understanding Viruses; Virus Protection; Prevention; Natural Immunity
- Active Protection Understanding Worms and Trojan Horses; Protecting Against Worms; Implementing Virus Protection; Client Virus Protection; Server-Based Virus Protection; E-Mail Gateway Virus Protection; Firewall-Based Virus Protection; Enterprise Virus Protection; Terms to Know; Review Questions; Chapter 9: Creating Fault Tolerance; Causes for Loss; Human Error; Routine Failure Events; Crimes; Environmental Events; Fault Tolerance Measures; Backups; Uninterruptible Power Supplies (UPSs) and Power Generators; Redundant Array of Independent Disks (RAID); Permissions; Border Security; Auditing
- Offsite Storage
- Notes:
- Description based upon print version of record.
- Includes index.
- ISBN:
- 9786610522484
- 9781280522482
- 1280522488
- 9780782151367
- 0782151361
- 9781417539611
- 1417539615
- OCLC:
- 475992136
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.