Computer and Information Security HandbookJohn R. Vacca Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications. |
Contents
Building a Secure Organization | 5 |
xxix | 25 |
Theory of Operation | 37 |
Preventing System Intrusions | 39 |
127 | 45 |
Guarding Against Network | 53 |
Network Access Control | 63 |
Unix and Linux Security | 67 |
A Simple Mathematical Model | 369 |
Daniel S Soper | 453 |
Virtual Private Networks | 507 |
Personal Privacy Policies | 519 |
225 | 551 |
567 | 591 |
Security Management | 605 |
Physical Security Essentials | 629 |
Protecting User Accounts | 71 |
Eliminating the Security Weakness of Linux and UNIX Operating Systems | 79 |
Internet Security | 93 |
The Botnet Problem | 121 |
Intranet Security | 133 |
Local Area Network Security | 149 |
Local Area Network Security | 151 |
A Comprehensive Introduction | 186 |
RFID Security | 209 |
RFID Challenges | 255 |
Network Forensics | 339 |
References | 677 |
Data Loss Protection | 745 |
Where to Begin? | 753 |
Its a Family Affair Not Just | 760 |
Appendix F List of Miscellaneous | 785 |
Scripting the Addition of Access Points | 795 |
Choosing the Correct Firewall | 817 |
Security Considerations | 837 |
Kerberos Enhancements | 843 |
Copyright | |