Welcome to UE Central Library

Keep Smiling

The Internet security guidebook : from planning to deployment / Juanita Ellis, Tim Speed.

By: Contributor(s): Material type: TextTextPublication details: San Diego : Academic Press, 2001Description: xxiv, 320 p. : ill. ; 24 cmISBN:
  • 9780122374715 (pbk)
Subject(s): DDC classification:
  • 005.8 21 El591
Contents:
ForewordPrefaceAcknowledgementsCopyright Notices and StatementsIntroduction Who Is Knocking at the Door?Chapter 1 Let's Do Business1.1 Security Components1.2 Do You Have a Process?1.3 The Cost of SecurityChapter 2 Security Review2.1 Review the Business2.2 What Is a Trusted Network?2.3 Initial Risk Analysis2.4 The Policy2.5 Implementation and FeedbackChapter 3 Cryptography3.1 History3.2 Key Types3.3 RSA-Public and Private Key3.4 PKI and Business SolutionsChapter 4 Secure Networks4.1 TCP/IP and OSI4.2 Port of Call (Let's Go on a Cruise)4.3 Denial-of-Service Attacks4.4 Virtual Private Networks4.5 Secure Sockets Layer (SSL)Chapter 5 Protecting Your Intranetfrom the Extranet and Internet5.1 So Many Choices! I'll Get One of Each!5.2 Firewall Product Functional Summaries5.3 Firewall Buyer's Assessment Form5.4 Firewall Vendors: Picking theProducts That Are Right for YouChapter 6 Authentication6.1 The Basics6.2 Authentication6.3 Authorisation6.4 Smart CardsChapter 7 E-Commerce-Public Key Infrastructure (PKI)7.1 PKI and You7.2 X.5097.3 Certificate Authority7.4 Certification Practice Statement7.5 Certificate Revocation List7.6 Key Recovery7.7 Lightweight Directory Access Protocol (LDAP)7.8 Public Key Cryptography Standards7.9 Public Key Infrastructure (X.509) StandardsChapter 8 Messaging Security8.1 Safe Communication-Messaging8.2 Getting Killed with Junk Mail8.3 Keep It RunningChapter 9 What Are We Doing Here?9.1 Risk Analysis9.2 Where Are the Threats?9.3 Technology Security Review9.4 Control Directory and Environmental Risk Table9.5 Competitive AssetChapter 10 Let's Make the Plans10.1 Security Plans, Policies, Procedures10.2 The Corporate Security Policy Document10.3 Physical Security Policy10.4 Network Security Policy10.5 Acceptable Use PolicyChapter 11 We Have BeenHacked! Oh, the Humanity!11.1 Incident HandlingChapter 12 The Total Package Specific Steps12.1 Putting It All Together12.2 The Plan12.3 Sample Plan to Roll Out PKIAppendix 1 Security ToolsA1.1 ToolsA1.2 Other Tool URLs
List(s) this item appears in: Computer | Computer_2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books UE-Central Library 005.8 El591 (Browse shelf(Opens below)) Available T13053

ForewordPrefaceAcknowledgementsCopyright Notices and StatementsIntroduction Who Is Knocking at the Door?Chapter 1 Let's Do Business1.1 Security Components1.2 Do You Have a Process?1.3 The Cost of SecurityChapter 2 Security Review2.1 Review the Business2.2 What Is a Trusted Network?2.3 Initial Risk Analysis2.4 The Policy2.5 Implementation and FeedbackChapter 3 Cryptography3.1 History3.2 Key Types3.3 RSA-Public and Private Key3.4 PKI and Business SolutionsChapter 4 Secure Networks4.1 TCP/IP and OSI4.2 Port of Call (Let's Go on a Cruise)4.3 Denial-of-Service Attacks4.4 Virtual Private Networks4.5 Secure Sockets Layer (SSL)Chapter 5 Protecting Your Intranetfrom the Extranet and Internet5.1 So Many Choices! I'll Get One of Each!5.2 Firewall Product Functional Summaries5.3 Firewall Buyer's Assessment Form5.4 Firewall Vendors: Picking theProducts That Are Right for YouChapter 6 Authentication6.1 The Basics6.2 Authentication6.3 Authorisation6.4 Smart CardsChapter 7 E-Commerce-Public Key Infrastructure (PKI)7.1 PKI and You7.2 X.5097.3 Certificate Authority7.4 Certification Practice Statement7.5 Certificate Revocation List7.6 Key Recovery7.7 Lightweight Directory Access Protocol (LDAP)7.8 Public Key Cryptography Standards7.9 Public Key Infrastructure (X.509) StandardsChapter 8 Messaging Security8.1 Safe Communication-Messaging8.2 Getting Killed with Junk Mail8.3 Keep It RunningChapter 9 What Are We Doing Here?9.1 Risk Analysis9.2 Where Are the Threats?9.3 Technology Security Review9.4 Control Directory and Environmental Risk Table9.5 Competitive AssetChapter 10 Let's Make the Plans10.1 Security Plans, Policies, Procedures10.2 The Corporate Security Policy Document10.3 Physical Security Policy10.4 Network Security Policy10.5 Acceptable Use PolicyChapter 11 We Have BeenHacked! Oh, the Humanity!11.1 Incident HandlingChapter 12 The Total Package Specific Steps12.1 Putting It All Together12.2 The Plan12.3 Sample Plan to Roll Out PKIAppendix 1 Security ToolsA1.1 ToolsA1.2 Other Tool URLs

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk