Up to 2 WeeksUsually despatched within 2 weeks
For introductory courses in IT Security. A strong business focus through a solid technical presentation of security tools. Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies. This program will provide a better teaching and learning experience-for you and your students. Here's how: Encourage Student's to Apply Concepts: Each chapter now contains new hands-on projects that use contemporary software. Business Environment Focus: This edition includes more of a focus on the business applications of the concepts. Emphasis has been placed on securing corporate information systems, rather than just hosts in general.Keep Your Course Current and Relevant: New examples, exercises, and research findings appear throughout the text.
BRIEF CONTENTSPreface xviiiAbout the Authors xxivChapter 1 The Threat Environment 11.1 Introduction 11.2 Employee and Ex-employee Threats 91.3 Malware 171.4 Hackers and Attacks 301.5 The Criminal Era 401.6 Competitor Threats 501.7 Cyberwar and Cyberterror 531.8 Conclusion 55Chapter 2 Planning and Policy 592.1 Introduction 602.2 Compliance Laws and Regulations 692.3 Organization 762.4 Risk Analysis 852.5 Technical Security Architecture 942.6 Policy-Driven Implementation 992.7 Governance Frameworks 1172.8 Conclusion 123Chapter 3 Cryptography 1273.1 What is Cryptography? 1283.2 Symmetric Key Encryption Ciphers 1393.3 Cryptographic System Standards 1453.4 The Negotiation Stage 1473.5 Initial Authentication Stage 1493.6 The Keying Stage 1523.7 Message-By-Message Authentication 1573.8 Quantum Security 1693.9 Cryptographic Systems 1703.10 SSL/TLS 1733.11 IPsec 1793.12 Conclusion 185Chapter 4 Secure Networks 1914.1 Introduction 1914.2 DoS Attacks 1954.3 ARP Poisoning 2074.4 Access Control for Networks 2144.5 Ethernet Security 2164.6 Wireless Security 2204.7 Conclusion 240Chapter 5 Access Control 2455.1 Introduction 2465.2 Physical Access and Security 2505.3 Passwords 2605.4 Access Cards and Tokens 2685.5 Biometric Authentication 2735.6 Cryptographic Authentication 2875.7 Authorization 2905.8 Auditing 2925.9 Central Authentication Servers 2945.10 Directory Servers 2965.11 Full Identity Management 3015.12 Conclusion 307Chapter 6 Firewalls 3136.1 Introduction 3146.2 Static Packet Filtering 3216.3 Stateful Packet Inspection 3236.4 Network Address Translation 3356.5 Application Proxy Firewalls and Content Filtering 3376.6 Intrusion Detection Systems and Intrusion Prevention Systems 3456.7 Antivirus Filtering and Unified Threat Management 3496.8 Firewall Architectures 3546.9 Firewall Management 3576.10 Firewall Filtering Problems 3676.11 Conclusion 369Chapter 7 Host Hardening 3757.1 Introduction 3757.2 Important Server Operating Systems 3857.3 Vulnerabilities and Patches 3927.4 Managing Users and Groups 4017.5 Managing Permissions 4047.6 Creating Strong Passwords 4087.7 Testing for Vulnerabilities 4167.8 Conclusion 429Chapter 8 Application Security 4338.1 Application Security And Hardening 4338.2 WWW and E-Commerce Security 4468.3 Web Browser Attacks 4548.4 E-Mail Security 4638.5 Voice over IP Security 4688.6 Other User Applications 4778.7 Conclusion 480Chapter 9 Data Protection 4859.1 Introduction 4859.2 Data Protection: Backup 4879.3 Backup Media and Raid 4959.4 Data Storage Policies 5039.5 Database Security 5119.6 Data Loss Prevention 5239.7 Conclusion 537Chapter 10 Incident and Disaster Response 54110.1 Introduction 54110.2 The Intrusion Response Process For Major Incidents 54810.3 Intrusion Detection Systems 56610.4 Business Continuity Planning 58110.5 It Disaster Recovery 58510.6 Conclusion 591A.1 Introduction 595A.2 A Sampling of Networks 596A.3 Network Protocols and Vulnerabilities 604A.4 Core Layers in Layered Standards Architectures 605A.5 Standards Architectures 606A.6 Single-Network Standards 608A.7 Internetworking Standards 610A.8 The Internet Protocol 611A.9 The Transmission Control Protocol 616A.10 The User Datagram Protocol 625A.11 TCP/IP Supervisory Standards 626A.12 Application Standards 632A.13 Conclusion 634Glossary 637index 655
Number Of Pages:
- ID: 9781292060453
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2018 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36