Network Security Illustrated (ILL)

Network Security Illustrated (ILL)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 320 p.
  • 言語 ENG
  • 商品コード 9780071415040
  • DDC分類 005.8

Full Description


Organized around common problems rather than technology or protocols, this reference shows readers all their options. It helps make the best decisions based on available budget and explains the limitations and risks of each solution. It contains excellent visuals - intuitive illustrations and maps, not graphs and charts and shows how to implement the chosen solution.

Contents

PART 1 Managing Security 1 Managing SecurityManaging Security: Systems and Network Monitoring PART 2 Outsourcing Options 3 Outsourcing Options: Outsourcing Network Monitoring 4 Outsourcing Options: Outsourcing Disaster Prevention 5 Outsourcing Options: Outsourcing Proactive Security PART 3 Reserving Rights 6 Reserving Rights: Digital Rights Management 7 Reserving Rights: Copy Protection PART 4 Determining Identity 8 Determining Identity: Passwords 9 Determining Identity: Digital Certificates 10 Determining Identity: Portable Identifiers 11 Determining Identity: Biometrics PART 5 Preserving Privacy 12 Preserving Privacy: Anonymity 13 Preserving Privacy: User Tracking 14 Preserving Privacy: Spam Management PART 6 Connecting Networks 15 Connecting Networks: Networking Hardware 16 Connecting Networks: Wireless Connections 17 Connecting Networks: Network Lingo PART 7 Hardening Networks 18 Hardening Networks: Firewalls 19 Hardening Networks: Network Address Translation 20 Hardening Networks: Virtual Private Networks 21 Hardening Networks: Traffic Shaping PART 8 Storing Information 22 Storing Information: Storage Media 23 Storing Information: Local File Systems 24 Storing Information: Network File Systems 25 Storing Information: Databases PART 9 Hiding Information 26 Hiding Information: Cryptography 27 Hiding Information: Cryptanalysis 28 Hiding Information: Steganography PART 10 Accessing Information 29 Accessing Information: Client-Server Architecture 30 Accessing Information: Internet Services 31 Accessing Information: Remote Access 32 Accessing Information: Peer-to-Peer Networking PART 11 Ensuring AvailabilityNER(01): WOW