Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Cole, Eric.

Title Network security bible / Eric Cole, Ronald Krutz, James W. Conley. [O'Reilly electronic resource]

Edition 2nd ed.
Imprint Indianapolis, Ind. : Wiley Pub., ©2009.
QR Code
Description 1 online resource (xliv, 891 pages) : illustrations
Series Bible ; v. 657
Bible.
Summary "Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page.
Contents pt. I. Network Security Landscape -- Ch. 1. State of Network Security -- Ch. 2. New Approaches to Cyber Security -- Ch. 3. Interfacing with the Organization -- pt. II. Security Principles and Practices -- Ch. 4. Information System Security Principles -- Ch. 5. Information System Security Management -- Ch. 6. Access Control -- Ch. 7. Attacks and Threats -- pt. III. Operating Systems and Applications -- Ch. 8. Windows Security -- Ch. 9. UNIX and Linux Security -- Ch. 10. Web Browser and Client Security -- Ch. 11. Web Security -- Ch. 12. Electronic mail (E-mail) Security -- Ch. 13. Domain Name System -- Ch. 14. Server Security -- pt. IV. Network Security Fundamentals -- Ch. 15. Network Protocols -- Ch. 16. Wireless Security -- Ch. 17. Network Architecture Fundamentals -- Ch. 18. Firewalls -- Ch. 19. Intrusion Detection/Prevention -- pt. V. Communication -- Ch. 20. Secret Communication -- Ch. 21. Covert Communication -- Ch. 22. Applications of Secure/Covert Communication -- pt. VI. The Security Threat and Response -- Ch. 23. Intrusion Detection and Response -- Ch. 24. Digital Forensics -- Ch. 25. Security Assessments, Testing, and Evaluation -- pt. VII. Integrated Cyber Security -- Ch. 26. Validating Your Security -- Ch. 27. Data Protection -- Ch. 28. Putting Everything Together -- Ch. 29. The Future.
Subject Computer security.
Computer networks -- Security measures.
Sécurité informatique.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer security.
Computer networks -- Security measures.
Computer networks -- Security measures
Computer security
Added Author Krutz, Ronald L., 1938-
Conley, James W.
Other Form: Print version: Cole, Eric. Network security bible. Indianapolis, IN : Wiley ; Chichester : John Wiley [distributor], ©2009 9780470502495 (DLC) 2009933372 (OCoLC)423589883
ISBN 0470502495
9780470502495
9780470569993
0470569999
9786612303487 (electronic bk.)
6612303484
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information