The complete guide to Internet security /

Main Author: Merkow, Mark S.
Other Authors: Breithaupt, Jim,
Format: Book
Language:English
Published: New York : AMACOM, 2000.
Subjects:
Online Access:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=41882
Table of Contents:
  • 1. Building a Foundation for Information Security
  • 2. The Fundamental Elements of Security
  • 3. Vulnerabilities to Internet-Attached Networks
  • 4. Hacking Isn't beyond the Corporate Perimeter
  • 5. Peeking inside a Hacker's Toolbox
  • 6. Instrumental Effects for Security Assurance
  • 7. Security Technologies
  • 8. Physical Security Control
  • 9. Logical Access Control
  • 10. Application Layer Security
  • 11. An Introduction to Cryptography
  • 12. Transport Layer Cryptography
  • 13. Digital Signatures and PPK Cryptography
  • 14. Key Management Considerations
  • 15. Multifactor Access Controls Using Cryptography
  • 16. Minding the Store for the Long Run
  • App. A.A Sample Internet Security Policy
  • App. B. Internet Bookmarks to Security-Related Sites
  • App. C. Security and Security-Testing Specialists.