Summary
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
The Most Authoritative Volume Available on Network Security
Includes a Security Dictionary and contributions from topical experts!
The solution to todays computer system security ills will only be solved when organizations obtain and implement a network security program. This comprehensive resource provides all the information necessary to formulate strategies to reach that goal. Learn to plan, implement, and maintain a secure network, and protect confidential information such as customer lists, credit card numbers, and stockholder names, and addresses. Prevent the attack or theft of specialized information such as trade secrets, formulas, production details, and other intellectual property. Network Security: The Complete Reference provides critical strategies, concepts, techniques, and solutions to keep your network system secure.
- Learn what it takes to build a solid security architecture
- Manage and control all access points to your digital data
- Anticipate incidents using risk analysis, threat definition, and
vulnerability assessment
- Secure confidentiality, integrity, privacy, and availability
- Understand how HIPAA, Gramm-Leach-Bliley and other security legislation
affects you
- Learn about a California law that requires compliance from all organizations, no matter what state they reside in
Technical Experts:
- Dr. Nick Efford & Steve Wright, Windows .NET Security
- Ken Pfeil, Physical Security
- Ben Rothke, Operating System Security
- Roger A. Grimes, Intrusion Detection
- Anil Desai & Rob Kraft, Database Security
- Ole Drews Jensen, Router & Device Security
- Dr. Andrew A. Vladimirov & Stephen Prendergast, Wireless Security
- Michael Howard, Secure Software
- Thaddeus Fortenberry & Eric Maiwald, VPN Security
- Michael ODea, Windows Security
- Brian Buege, Michael Judd & Jim Keogh, J2EE Security
- Bernard Chapple, Disaster Recovery
- Glen Carty & Steve Thomas, Novell Security
- Christian Genetski & Curtis Karnow, Legal Issues
- Curtis W. Rose, Incident Response & Computer Forensics
- Thomas Knox & Robert Clugston, Linux/UNIX Security
- Barak Weicheselbaum, Application Security
Table of Contents
- Part 1 Information Security
Foundations
Ch. 1: Introduction
Ch. 2: Network Security Overview
Ch. 3: Security Policy Development
Part 2 Security Architecture Components
Ch. 4: Network Security Architecture
Ch. 5: Computer Security Architecture
Ch. 6: Authentication and Authorization Methods
Ch. 7: Application Security
Ch. 8: Unix Security
Ch. 9: Windows Security
Ch. 10: Novell NetWare
Ch. 11: J2EE Security
Ch. 12: Database Security
Ch. 13: Virtual Private Networks (VPNs)
Ch. 14: Wireless Network Security
Ch. 15: Data Security Architecture
Part 3 Managing the Security Infrastructure
Ch. 16: Security Management Architecture
Ch. 17: Security Organization
Ch. 18: Integrity and Availability Architecture
Ch. 19: Disaster Recovery and Business Continuity
Ch. 20: Incident Response and Forensic Analysis
Ch. 21: Physical Security
Part 4 Appendices
Appendix A: Organization Certification, System Evaluation and Assurance
Appendix B: HIPAA Preparation
Appendix C: Gramm-Leach-Bliley Act (GLB) Preparation
Appendix D: Dictionary of IT Security Terms