Limit search to available items
Book Cover
CD-ROM
Author Merkow, Mark S.

Title The complete guide to Internet security / Mark S. Merkow & James Breithaupt
Published New York : AMACOM, [2000]
©2000

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Mer/Cgt  AVAILABLE
Description x, 356 pages : illustrations ; 24 cm
Contents 1. Building a Foundation for Information Security -- 2. The Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. An Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A. A Sample Internet Security Policy -- App. B. Internet Bookmarks to Security-Related Sites -- App. C. Security and Security-Testing Specialists
Summary Annotation. Hardly a week goes by without a report of some hacker, disgruntled employee, or techno-thief breaking into a computer system -- vandalizing Web sites, stealing confidential data, compromising trade secrets, or worse. Much more than merely troublesome or inconvenient, these unauthorized incursions often spell disaster for businesses.The Complete Guide to Internet Security offers a behind-the-scenes guided tour through the field of information security for IT professionals, systems analysts, CIOs, programmers, and anyone intent on making their computer system more secure.Practical and easy to understand, this indispensable guide covers: inherent vulnerabilities of Internet protocol-attached networks -- weaknesses of e-commerce sites -- attacks from within the company -- common hacker tools -- costly consequences of security breaches -- physical and logical system security, including firewalls, routers, proxies, access controls, intrusion detection, and policy-based networking -- commercialsecurity software -- cryptography, and more
Bibliography Includes bibliographical references (pages 318-326) and index
Subject Computer networks -- Security measures.
Data encryption (Computer science)
World Wide Web -- Security measures.
Internet -- Security measures.
Computer security.
SUBJECT Western and Northern Territories (Poland) http://id.loc.gov/authorities/subjects/sh85146248
Author Breithaupt, Jim, 1955-
EBSCOhost
LC no. 00026634
ISBN 081447070X
Other Titles Internet security
OTHER TI eBooks on EBSCOhost
Other Titles eBook Academic Subscription Collection - Worldwide