Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: General Security Concepts
Multi-Factor Authentication and Security
Real World Scenario: Creating a Corporate Connection to a Business Partner
Chapter 2: Know Your Enemy
New Attacks on the Way
Real World Scenario: A Virus Out of Control
Chapter 3: Infrastructure and Connectivity
ATT Wireless NOCs
Real World Scenario: Dual-Homed Server-Based Proxy Firewall
Real World Scenario: Users Installing Unauthorized Software
Real World Scenario: Connecting Remote Network Users
Real World Scenairo: SMTP Relaying in Action
Real World Scenario: Remote File Transfers
Real World Scenario: Using ICMP to Deal with Smurf Attacks
Real World Scenario: The School Lab
Chapter 4: Monitoring Communications Activity
Real World Scenario: These Network Audit Files Are Killing Me
Real World Scenario: The E-Mail Incident
Real World Scenario: The Virus That Keeps On Giving
Chapter 5: Implementing and Maintaining a Secure Network
Real World scenario: Implementing a Secure Server Environment
Real World Scenario: Connecting Windows Systems Remotely
Real World Scenario: Does Anybody Really Like Spam?
Real World Scenario: Where Did All These Strange IP Addresses Originate?
Chapter 6: Working with a Secure Network
Real World Scenario: A Ghost in the Machine?
Evaluating Your Security System
Real World Scenario: Installing Biometric Devices
Real World Scenario: Remote Diagnostic Support
Real World Scenario: Securing Your Wireless Devices
Real World Scenario: Conducting a Risk Assessment
Chapter 7: Cryptography Basics and Methods
Real World Scenario: We're All Human, or Mr. Key's Wild Ride
eBay Is a Great Place to Go Shopping
Real World Scenario: Building a Security System
Real World Scenario: Designing a CA Structure for Your Organization
Chapter 8: Cryptography Standards
Real World Scenario: Working with Credit Card Information Online
Real World Scenario: Securing UNIX Interactive Users
Real World Scenario: What Do You Do About Forgetful Programmers?
Real World Scenario: Selling the Company's Old Computers
Chapter 9: Security Policies and Procedures
Real World Scenario: Some Protection Is Better Than None—Or Is It?
Real World Scenario: Should I Buy the Computer Store's SLA for My New Laptop?
Real World Scenario: Performing a Usage Audit
Chapter 10: Security Management
Real World Scenario: When to Involve Law Enforcement
Real World Scenario: Selling Your Old Computers
Real world Scenario: Where Did My VAX Go?
Real World Scenario: You Be the Judge
Real world Scenario: Upgrading Your Servers
Real World Scenario: Security Awareness Program
Previous page
Table of content
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167
Authors:
Michael A. Pastore
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Quality: Popular Views
The Iterative Development Process Model
Quality Management Models
Productivity Metrics
Collecting Customer Outage Data for Quality Improvement
The CISSP and CAP Prep Guide: Platinum Edition
Physical (Environmental) Security
The Accreditation Phase
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix G Control Baselines
C++ How to Program (5th Edition)
Computer Organization
Summary
Linked Lists
Exercises
Summary
Visual C# 2005 How to Program (2nd Edition)
Scope of Declarations
Terminology
Data Abstraction and Encapsulation
B.3. Converting Octal and Hexadecimal Numbers to Binary Numbers
J.13. Class ATMCaseStudy
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Boolean (Logical) Values
Client 2Adding Error Checking
Prerequisites
Client 3Processing Queries
Client 1Connecting to the Server
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Microwave
Data Communications Basics
Packet-Switched Networks
IP QoS
VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies