Flylib.com
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors:
Tim Speed
,
Juanita Ellis
BUY ON AMAZON
Table of Contents
BackCover
Internet Security - A Jumpstart for Systems Administrators and IT Managers
Foreword
Introduction
Chapter 1: The Internet and Security
1.2 TCPIP: the nails of the Internet
Chapter 2: The Security Review Process
2.2 Review the state of the business
2.3 Analyze the technology being used
2.4 Risk analysis
2.5 Plans and policies
2.6 Implementation
Chapter 3: Cryptography
3.2 Key types
3.3 RSA: public and private key
3.4 PKI and business solutions
Chapter 4: Secure Networks
4.2 Denial-of-service attacks
4.3 Virtual private networks
4.4 Secure sockets layer
Chapter 5: Protecting Your Intranet From the Extranet and Internet
5.2 Firewall product functional summaries
5.3 Firewall buyer s assessment form
5.4 Firewall vendors: Picking the products that are right for you
5.5 SSL network appliance overview
5.6 Secure access - SSL based extranet appliances
5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications
Chapter 6: Authentication and Authorization
6.2 Authentication
6.3 Authorization
6.4 Smart cards
Chapter 7: E-Commerce: Public Key Infrastructure
7.2 X.509
7.3 Certificate authority
7.4 Certification practice statement
7.5 Certificate revocation list
7.6 Key recovery
7.7 Lightweight directory access protocol
7.8 Public key cryptography standards
7.9 Public key infrastructure (X.509) standards
Chapter 8: Messaging Security
8.2 Junk mail
8.3 Keep it running
Chapter 9: What are we Doing Here?
9.2 The threats
9.3 Technology security review
9.4 Control directory and environment risk table
9.5 Competitive asset
Chapter 10: Disaster Recovery
10.2 Incident handling requirements
10.3 Incident handling processes
10.4 Incident handling procedures
10.5 Incident handling team implementation
10.6 Disaster recovery and business continuity
Appendix 1: Security Tools
A1.2 Other tool URLs
Appendix 2: The CERT Report
A2.1 Incident reporting guidelines
A2.2 Windows NT intruder detection checklist
Glossary
E-K
L-P
R-U
V-X
References
Filters
General protection
Personal firewall
Physical security
User authentication
Virus protection
Companies Copyright Notices and Statements
Cert Permission for Reprint
Warning and Disclaimer
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors:
Tim Speed
,
Juanita Ellis
BUY ON AMAZON
Cisco CallManager Fundamentals (2nd Edition)
The Seven Fundamentals of Call Routing
Calling Search Spaces and Partitions
H.323 Gateways
Manageability Tools
Identifying CDR Data Generated for Each Call Type
Mastering Delphi 7
Building the User Interface
Delphis Database Architecture
Web Programming with WebBroker and WebSnap
Using XML Technologies
Appendix B Extra Delphi Tools from Other Sources
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 220 Branch-Circuit, Feeder, and Service Calculations
Article 320 Armored Cable Type AC
Article 342 Intermediate Metal Conduit Type IMC
Article 503 Class III Locations
Example D3(a) Industrial Feeders in a Common Raceway
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 24. Discover Networks with NetStumbler
Hack 25. Detect Networks with Handheld PCs
Hack 32. Track 802.11 Frames in Ethereal
Hack 38. Graph Your Wireless Performance
Hack 71. Wall Off Your Wireless
.NET System Management Services
Using the System.Management Namespace
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
Java All-In-One Desk Reference For Dummies
Using Eclipse
Working with Strings
Getting Input from the User
Choosing from a List
Database for $100, Please
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies