Book description
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
· Shield data from both the internal and external intruder
· Discover products that can detect and prevent these break-ins
· Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
· Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Foreword
- Acknowledgments
- Introduction
- Chapter 1: The Internet and Security
- Chapter 2: The Security Review Process
- Chapter 3: Cryptography
- Chapter 4: Secure Networks
-
Chapter 5: Protecting Your Intranet from the Extranet and Internet
- 5.1 So many choices!
- 5.2 Firewall product functional summaries
- 5.3 Firewall buyer’s assessment form
- 5.4 Firewall vendors: Picking the products that are right for you
- 5.5 SSL network appliance overview4
- 5.6 Secure access—SSL based extranet appliances5
- 5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications6
- Chapter 6: Authentication and Authorization
- Chapter 7: E-Commerce: Public Key Infrastructure
- Chapter 8: Messaging Security
- Chapter 9: What Are We Doing Here?
- Chapter 10: Disaster Recovery
- Appendix 1: Security Tools
- Appendix 2: The CERT Report
- Glossary
- References
- Index
Product information
- Title: Internet Security
- Author(s):
- Release date: April 2003
- Publisher(s): Digital Press
- ISBN: 9780080509075
You might also like
book
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
The best-selling first edition of became the bible of Internet security by showing a generation of …
book
Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established …
book
Network Security
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, …
book
Express Learning: Cryptography and Network Security
Express Learning is a series of books designed as quick reference guides to important undergraduate computer …