Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: General Security Concepts
Multi-Factor Authentication and Security
Real World Scenario: Creating a Corporate Connection to a Business Partner
Chapter 2: Know Your Enemy
New Attacks on the Way
Real World Scenario: A Virus Out of Control
Chapter 3: Infrastructure and Connectivity
ATT Wireless NOCs
Real World Scenario: Dual-Homed Server-Based Proxy Firewall
Real World Scenario: Users Installing Unauthorized Software
Real World Scenario: Connecting Remote Network Users
Real World Scenairo: SMTP Relaying in Action
Real World Scenario: Remote File Transfers
Real World Scenario: Using ICMP to Deal with Smurf Attacks
Real World Scenario: The School Lab
Chapter 4: Monitoring Communications Activity
Real World Scenario: These Network Audit Files Are Killing Me
Real World Scenario: The E-Mail Incident
Real World Scenario: The Virus That Keeps On Giving
Chapter 5: Implementing and Maintaining a Secure Network
Real World scenario: Implementing a Secure Server Environment
Real World Scenario: Connecting Windows Systems Remotely
Real World Scenario: Does Anybody Really Like Spam?
Real World Scenario: Where Did All These Strange IP Addresses Originate?
Chapter 6: Working with a Secure Network
Real World Scenario: A Ghost in the Machine?
Evaluating Your Security System
Real World Scenario: Installing Biometric Devices
Real World Scenario: Remote Diagnostic Support
Real World Scenario: Securing Your Wireless Devices
Real World Scenario: Conducting a Risk Assessment
Chapter 7: Cryptography Basics and Methods
Real World Scenario: We're All Human, or Mr. Key's Wild Ride
eBay Is a Great Place to Go Shopping
Real World Scenario: Building a Security System
Real World Scenario: Designing a CA Structure for Your Organization
Chapter 8: Cryptography Standards
Real World Scenario: Working with Credit Card Information Online
Real World Scenario: Securing UNIX Interactive Users
Real World Scenario: What Do You Do About Forgetful Programmers?
Real World Scenario: Selling the Company's Old Computers
Chapter 9: Security Policies and Procedures
Real World Scenario: Some Protection Is Better Than None—Or Is It?
Real World Scenario: Should I Buy the Computer Store's SLA for My New Laptop?
Real World Scenario: Performing a Usage Audit
Chapter 10: Security Management
Real World Scenario: When to Involve Law Enforcement
Real World Scenario: Selling Your Old Computers
Real world Scenario: Where Did My VAX Go?
Real World Scenario: You Be the Judge
Real world Scenario: Upgrading Your Servers
Real World Scenario: Security Awareness Program
Previous page
Table of content
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167
Authors:
Michael A. Pastore
BUY ON AMAZON
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Common misperceptions about SOA
Common tangible benefits of SOA
An SOA timeline (from XML to Web services to SOA)
Web Services and Primitive SOA
Service activity
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Captology Looking Forward
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
RSH
RTSP
Transparent Firewalls
Architectural Overview
Directing Traffic to the AIP-SSM
VBScript in a Nutshell, 2nd Edition
VBScript Data Types: The Many Faces of the Variant
Common Problem Areas and How to Avoid Them
Why Use WSH?
Section A.10. Information Functions
Section B.3. Date and Time Constants
GDI+ Programming with C#
Graphics Class Properties
Working with Brushes and Pens
Skewing Images
Using GDI in the Managed Environment
Section A.1. Why Exception Handling?
User Interfaces in C#: Windows Forms and Custom Controls
Modern Controls
Custom Controls
Design-Time Support for Custom Controls
Data Controls
MDI Interfaces and Workspaces
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies