Flylib.com
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors:
Tim Speed
,
Juanita Ellis
BUY ON AMAZON
Table of Contents
BackCover
Internet Security - A Jumpstart for Systems Administrators and IT Managers
Foreword
Introduction
Chapter 1: The Internet and Security
1.2 TCPIP: the nails of the Internet
Chapter 2: The Security Review Process
2.2 Review the state of the business
2.3 Analyze the technology being used
2.4 Risk analysis
2.5 Plans and policies
2.6 Implementation
Chapter 3: Cryptography
3.2 Key types
3.3 RSA: public and private key
3.4 PKI and business solutions
Chapter 4: Secure Networks
4.2 Denial-of-service attacks
4.3 Virtual private networks
4.4 Secure sockets layer
Chapter 5: Protecting Your Intranet From the Extranet and Internet
5.2 Firewall product functional summaries
5.3 Firewall buyer s assessment form
5.4 Firewall vendors: Picking the products that are right for you
5.5 SSL network appliance overview
5.6 Secure access - SSL based extranet appliances
5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications
Chapter 6: Authentication and Authorization
6.2 Authentication
6.3 Authorization
6.4 Smart cards
Chapter 7: E-Commerce: Public Key Infrastructure
7.2 X.509
7.3 Certificate authority
7.4 Certification practice statement
7.5 Certificate revocation list
7.6 Key recovery
7.7 Lightweight directory access protocol
7.8 Public key cryptography standards
7.9 Public key infrastructure (X.509) standards
Chapter 8: Messaging Security
8.2 Junk mail
8.3 Keep it running
Chapter 9: What are we Doing Here?
9.2 The threats
9.3 Technology security review
9.4 Control directory and environment risk table
9.5 Competitive asset
Chapter 10: Disaster Recovery
10.2 Incident handling requirements
10.3 Incident handling processes
10.4 Incident handling procedures
10.5 Incident handling team implementation
10.6 Disaster recovery and business continuity
Appendix 1: Security Tools
A1.2 Other tool URLs
Appendix 2: The CERT Report
A2.1 Incident reporting guidelines
A2.2 Windows NT intruder detection checklist
Glossary
E-K
L-P
R-U
V-X
References
Filters
General protection
Personal firewall
Physical security
User authentication
Virus protection
Companies Copyright Notices and Statements
Cert Permission for Reprint
Warning and Disclaimer
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors:
Tim Speed
,
Juanita Ellis
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Using View Column Properties
Real-World Example 1: Dynamic Drop-Down Lists on the Web
Real-World Example 2: Dialog Boxes and window. opener on the Web
Writing Java Agents
Applet Tags
VBScript Programmers Reference
What VBScript Is and Isn™t!
Windows Script Host
Appendix A VBScript Functions and Keywords
Appendix C Coding Convention
Appendix K The Variant Subtypes
Oracle Developer Forms Techniques
Special Tips for Working with Multi-form Applications
An Exclusive Server-Side Commit from Forms
Deficiencies in Forms Error-Message Handling
Object-oriented Methods in Forms
Inheritance
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Spanning Long Statements over Multiple Lines
Introduction
Exploring Chart Styles
Solving First-Order Initial Value Problems
Solving Inverse Problems
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 9. Use del.icio.us to Keep Up with Google Maps
Hack 21. Track the International Space Station
Hack 26. Follow Your Packets Across the Internet
Hack 45. Share Pictures with Your Community
Hack 66. Add Your Own Custom Map
Python Programming for the Absolute Beginner, 3rd Edition
More on HTML and URL Escapes
DBM Files
Shelve Files
Permuting Sequences
Wrapping C Environment Calls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies