Network Security Illustrated
Jason Albanese, Wes Sonnenreich
- 出版商: McGraw-Hill Education
- 出版日期: 2003-09-26
- 售價: $1,590
- 貴賓價: 9.5 折 $1,511
- 語言: 英文
- 頁數: 423
- 裝訂: Paperback
- ISBN: 0071415041
- ISBN-13: 9780071415040
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$450$383 -
$650$553 -
$690$587 -
$450$356 -
$590$466 -
$199$179 -
$880$792 -
$980$960 -
$750$675 -
$800$760 -
$560$504 -
$2,530$2,404 -
$490$417 -
$450$351 -
$820$656 -
$750$593 -
$490$417 -
$2,050$1,948 -
$650$507 -
$580$458 -
$580$452 -
$580$452 -
$580$458 -
$680$646 -
$600$510
相關主題
商品描述
Summary
If you think a background in computer science is necessary for understanding information security, think again.
Network Security Illustrated explores information security using a simple, powerful methodology and captivating illustrations. This highly accessible approach makes learning how to protect valuable data and computer systems fast and fun.
BONUS: The enclosed wall poster reinforces every major security concept and relationship via intuitive illustrations.
o you want to better understand how computer security impacts your business?
Organized around common business problems instead of technology, this easily navigable, illustrated reference will help you:
1. Understand major security concepts and solutions
2. Identify limitations and risks in security strategies
3. Select and implement solutions that are right for your needsPerfect for all managers who make business decisions about security and need to get up to speed on security concepts, Network Security Illustrated is equally beneficial to network administrators, security specialists, and solutions developers.
LEARN HOW TO:
* Manage and Outsource Security
* Identify and Authenticate Users
* Protect a Network’s Infrastructure
* Store, Hide, and Access Information Securely
* Detect Intrusions and Recover From Disasters
* And much, much more!
Table of Contents
PART 1 Managing Security
1 Managing Security: The Security Assessment
2 Managing Security: Systems and Network Monitoring
PART 2 Outsourcing Options
3 Outsourcing Options: Outsourcing Network Monitoring
4 Outsourcing Options: Outsourcing Disaster Prevention
5 Outsourcing Options: Outsourcing Proactive Security
PART 3 Reserving Rights
6 Reserving Rights: Digital Rights Management
7 Reserving Rights: Copy Protection
PART 4 Determining Identity
8 Determining Identity: Passwords
9 Determining Identity: Digital Certificates
10 Determining Identity: Portable Identifiers
11 Determining Identity: Biometrics
PART 5 Preserving Privacy
12 Preserving Privacy: Anonymity
13 Preserving Privacy: User Tracking
14 Preserving Privacy: Spam Management
PART 6 Connecting Networks
15 Connecting Networks: Networking Hardware
16 Connecting Networks: Wireless Connections
17 Connecting Networks: Network Lingo
PART 7 Hardening Networks
18 Hardening Networks: Firewalls
19 Hardening Networks: Network Address Translation
20 Hardening Networks: Virtual Private Networks
21 Hardening Networks: Traffic Shaping
PART 8 Storing Information
22 Storing Information: Storage Media
23 Storing Information: Local File Systems
24 Storing Information: Network File Systems
25 Storing Information: Databases
PART 9 Hiding Information
26 Hiding Information: Cryptography
27 Hiding Information: Cryptanalysis
28 Hiding Information: Steganography
PART 10 Accessing Information
29 Accessing Information: Client-Server Architecture
30 Accessing Information: Internet Services
31 Accessing Information: Remote Access
32 Accessing Information: Peer-to-Peer Networking
PART 11 Ensuring Availability