Network Security Bible, 2nd EditionISBN: 978-0-470-50249-5
Paperback
936 pages
September 2009
|
Part I: Network Security Landscape.
Chapter 1: State of Network Security.
Chapter 2: New Approaches to Cyber Security.
Chapter3: InterfacingwiththeOrganization.
Part II: Security Principles and Practices.
Chapter 4: Information System Security Principles.
Chapter 5: Information System Security Management.
Chapter 6: Access Control.
Chapter 7: Attacks and Threats.
Part III: Operating Systems and Applications.
Chapter 8: Windows Security.
Chapter 9: UNIX and Linux Security.
Chapter 10: Web Browser and Client Security.
Chapter 11: Web Security.
Chapter 12: Electronic mail (E-mail) Security.
Chapter13:DomainName System.
Chapter 14: Server Security.
Part IV: Network Security Fundamentals.
Chapter15:NetworkProtocols.
Chapter 16: Wireless Security.
Chapter17:NetworkArchitecture Fundamentals.
Chapter18: Firewalls.
Chapter 19: Intrusion Detection/Prevention.
Part V: Communication.
Chapter 20: Secret Communication.
Chapter21:CovertCommunication.
Chapter 22: Applications of Secure/Covert Communication.
Part VI: The Security Threat and Response.
Chapter23: IntrusionDetection andResponse.
Chapter 25: Security Assessments, Testing, and Evaluation.
Part VII: Integrated Cyber Security.
Chapter 26: Validating Your Security.
Chapter27:DataProtection.
Chapter 28: Putting Everything Together.
Chapter29:The Future.
Index.