|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Chey Cobb (Former Sr. Tech Security Advisor, National Reconnaissance Office)Publisher: John Wiley & Sons Inc Imprint: For Dummies Dimensions: Width: 18.80cm , Height: 2.30cm , Length: 23.40cm Weight: 0.590kg ISBN: 9780764516795ISBN 10: 0764516795 Pages: 416 Publication Date: 01 November 2002 Audience: College/higher education , Professional and scholarly , Undergraduate , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: Out of print, replaced by POD ![]() We will order this item for you from a manufatured on demand supplier. Table of ContentsIntroduction 1 Part I: The Path to Network Security 7 Chapter 1: Starting Down the Road to Network Security 9 Chapter 2: Evaluating and Documenting Your Network Situation 39 Chapter 3: Assessing the Risks 53 Chapter 4: Planning and Implementing Security Policies and Procedures 65 Part II: Your Network Is Your Business 83 Chapter 5: Choosing Controls without Breaking the Bank 85 Chapter 6: You Could Be Liable If 101 Chapter 7: Building a Secure Network from Scratch 117 Part III: The All-Important Security Mechanisms 127 Chapter 8: Anti-Virus Software 129 Chapter 9: Firewalls and Brimstone 141 Chapter 10: Intrusion Detection Systems 155 Chapter 11: Access Controls/Privileges 167 Part IV: Special Needs Networking 189 Chapter 12: When Patchwork Doesn’t Mean Quilting: Unix Systems 191 Chapter 13: Boarding Up Your MS Windows 201 Chapter 14: Is Anything Eating Your Mac? 221 Chapter 15: Application Software Patching 233 Chapter 16: Very Precious Network Security 251 Chapter 17: Securing Your Wireless Network 261 Chapter 18: E-Commerce Special Needs 273 Part V: Dealing with the Unthinkable 287 Chapter 19: Emergency! Incident Response 289 Chapter 20: Disaster Recovery 305 Chapter 21: Who Did the Dirty: Computer Forensics 321 Part VI: The Part of Tens 335 Chapter 22: Ten Best Security Practices 337 Chapter 23: Ten Best Security Web Sites 345 Chapter 24: Ten Security Tools Every Network Security Geek Should Have 349 Chapter 25: Ten Questions to Ask a Security Consultant 353 Index 359ReviewsAuthor InformationChey Cobb, CISSP, has trained CIA and NSA personnel in computer security, held a Top Secret clearance for the U.S. intelligence community, and helped develop government security policies and procedures. Tab Content 6Author Website:Countries AvailableAll regions |