The complete guide to Internet security /
Main Author: | |
---|---|
Other Authors: | |
Format: | Book |
Language: | English |
Published: |
New York :
AMACOM,
2000.
|
Subjects: | |
Online Access: | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=41882 |
Table of Contents:
- 1. Building a Foundation for Information Security
- 2. The Fundamental Elements of Security
- 3. Vulnerabilities to Internet-Attached Networks
- 4. Hacking Isn't beyond the Corporate Perimeter
- 5. Peeking inside a Hacker's Toolbox
- 6. Instrumental Effects for Security Assurance
- 7. Security Technologies
- 8. Physical Security Control
- 9. Logical Access Control
- 10. Application Layer Security
- 11. An Introduction to Cryptography
- 12. Transport Layer Cryptography
- 13. Digital Signatures and PPK Cryptography
- 14. Key Management Considerations
- 15. Multifactor Access Controls Using Cryptography
- 16. Minding the Store for the Long Run
- App. A.A Sample Internet Security Policy
- App. B. Internet Bookmarks to Security-Related Sites
- App. C. Security and Security-Testing Specialists.