Practical Internet Security - John R. Vacca

Practical Internet Security

By: John R. Vacca

Paperback | 4 November 2010

At a Glance

Paperback


$273.07

or 4 interest-free payments of $68.27 with

 or 

Aims to ship in 7 to 10 business days

When will this arrive by?
Enter delivery postcode to estimate

to Internet Security.- Internet Technologies.- Basic Security Issues.- Establishing Your Organization's Security.- Real Threats That Impact Security.- A Security Policy: The Foundation of Your Protection.- Developing Your Security Policy.- Steps to Take Now.- Responding to Attacks.- Securing the Web Client.- Threats and Vulnerabilities.- Protecting Your Web Browser.- Network Interconnections: A Majorpoint of Vulnerability.- Basic Operating System and TCP/IP Concepts.- Early System Security Improvements.- Deterring Masqueraders and Ensuring Authenticity.- Impersonating Users.- How Masqueraders Infiltrate a System.- Holding Your Defensive Line.- Preventing Eavesdropping to Protect Your Privacy.- Unauthorized Listening and Looking.- Countering or not Countering the Eavesdropper: That's the Question?.- Thwarting Counterfeiters and Forgery to Retain Integrity.- The Forger's Arsenal.- Shielding your Assets.- Avoiding Disruption of Service to Maintain Availability.- Denial-of-Service Attacks.- Constructing Your Bastions.- The Importance of Firewalls.- Configuring Operating System and Network Security.- Operating Systems that Pose Security Risks.- Network Security.- Enhancing Web Server Security.- Controlling Access.- Extended Web Site Security Functionality.- Securing Web Communications with SSL VPNS.- Issuing and Managing Certificates.- Why Digital Certificates are Used.- Certificate Authorities.- Trusting SSL CAs in Servers and Browsers.- Firewalls and Firewall Topologies.- Protecting Servers and Clients with Firewalls.- Choosing the Right Firewall.- Firewall Topologies.- Selecting Firewall Security Topology Policy.- Security Management Solutions and Future Directions.- Identifying and Responding to Security Violations.- Real-Time Monitoring and Auditing.- Limiting Damage.- Keeping Up to Date on New Threats.- Emerging Technologies.- Summary, Conclusions and Recommendations.

Other Editions and Formats

Hardcover

Published: 18th October 2006

More in Network Hardware

Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
Designing Embedded Hardware 2e : O'Reilly Ser. - John Catsoulis

RRP $95.00

$43.25

54%
OFF
Cisco IOS in a Nutshell : In a Nutshell (O'Reilly) - James Boney
UNIX in a Nutshell : In a Nutshell (O'Reilly) - Arnold Robbins

RRP $85.50

$43.75

49%
OFF
JUNOS Cookbook : Cookbooks (O'Reilly) - Aviva Garrett

RRP $104.50

$51.75

50%
OFF
CEH Certified Ethical Hacker Bundle, Fourth Edition - Matt Walker
Practical Monitoring : Effective Strategies for the Real World - Mike Julian
Getting Started with Netduino : OREILLY - Chris Walker

RRP $38.00

$21.40

44%
OFF
JUNOS Enterprise Switching : OREILLY - Harry Reynolds

RRP $133.00

$64.50

52%
OFF
Ethernet Switches - Charles Spurgeon

RRP $24.75

$15.25

38%
OFF
Juniper QFX5100 Series - Douglas Richard, Jr. Hanks

RRP $114.00

$55.50

51%
OFF
Getting Started with Bluetooth Low Energy - Carles Cufi Akiba

RRP $85.50

$36.35

57%
OFF