Flylib.com
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors:
Tim Speed
,
Juanita Ellis
BUY ON AMAZON
Table of Contents
BackCover
Internet Security - A Jumpstart for Systems Administrators and IT Managers
Foreword
Introduction
Chapter 1: The Internet and Security
1.2 TCPIP: the nails of the Internet
Chapter 2: The Security Review Process
2.2 Review the state of the business
2.3 Analyze the technology being used
2.4 Risk analysis
2.5 Plans and policies
2.6 Implementation
Chapter 3: Cryptography
3.2 Key types
3.3 RSA: public and private key
3.4 PKI and business solutions
Chapter 4: Secure Networks
4.2 Denial-of-service attacks
4.3 Virtual private networks
4.4 Secure sockets layer
Chapter 5: Protecting Your Intranet From the Extranet and Internet
5.2 Firewall product functional summaries
5.3 Firewall buyer s assessment form
5.4 Firewall vendors: Picking the products that are right for you
5.5 SSL network appliance overview
5.6 Secure access - SSL based extranet appliances
5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications
Chapter 6: Authentication and Authorization
6.2 Authentication
6.3 Authorization
6.4 Smart cards
Chapter 7: E-Commerce: Public Key Infrastructure
7.2 X.509
7.3 Certificate authority
7.4 Certification practice statement
7.5 Certificate revocation list
7.6 Key recovery
7.7 Lightweight directory access protocol
7.8 Public key cryptography standards
7.9 Public key infrastructure (X.509) standards
Chapter 8: Messaging Security
8.2 Junk mail
8.3 Keep it running
Chapter 9: What are we Doing Here?
9.2 The threats
9.3 Technology security review
9.4 Control directory and environment risk table
9.5 Competitive asset
Chapter 10: Disaster Recovery
10.2 Incident handling requirements
10.3 Incident handling processes
10.4 Incident handling procedures
10.5 Incident handling team implementation
10.6 Disaster recovery and business continuity
Appendix 1: Security Tools
A1.2 Other tool URLs
Appendix 2: The CERT Report
A2.1 Incident reporting guidelines
A2.2 Windows NT intruder detection checklist
Glossary
E-K
L-P
R-U
V-X
References
Filters
General protection
Personal firewall
Physical security
User authentication
Virus protection
Companies Copyright Notices and Statements
Cert Permission for Reprint
Warning and Disclaimer
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors:
Tim Speed
,
Juanita Ellis
BUY ON AMAZON
FileMaker Pro 8: The Missing Manual
Creating Layouts
Setting up Field Controls
Stored, Unstored, and Global Fields
Disable Script Steps
File Maintenance
SQL Hacks
Hack 16. Search for a String Across Columns
Hack 27. Identify Overlapping Ranges
Hack 30. Calculate the Maximum of Two Fields
Hack 80. Play Six Degrees of Kevin Bacon
Hack 91. Export and Import Table Definitions
Special Edition Using Crystal Reports 10
Adding Alerting to Your Reports
Understanding Network Protocols
Understanding the Report Designer Component
Troubleshooting
Scheduling to a Specific Format
Special Edition Using FileMaker 8
Database Analysis
FileMaker Extra: Managing the Relationships Graph
Launch Files
Troubleshooting
Installing FileMaker Server
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Oracle and PL/SQL
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Appendix A Default Usernames and Passwords
FileMaker 8 Functions and Scripts Desk Reference
Get(ApplicationLanguage)
Get(LayoutName)
Get(SystemVersion)
GetAsTime()
General Resources for Tips and Tricks
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies