Cargando…

Network and system security /

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, 2014.
Edición:Second edition
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn857277436
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 130830s2014 ne ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d OPELS  |d N$T  |d YDXCP  |d B24X7  |d UPM  |d OCLCF  |d UIU  |d DEBSZ  |d OCLCQ  |d ICA  |d AGLDB  |d ZCU  |d MERUC  |d OCLCQ  |d NJR  |d OCLCQ  |d U3W  |d D6H  |d OCLCQ  |d VTS  |d ICG  |d OCLCQ  |d STF  |d DKC  |d OCLCQ  |d DCT  |d VLB  |d DKDLA  |d CNSPO  |d K6U  |d Z5A  |d INT  |d AU@  |d COO  |d EYM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 860943560  |a 1058949738 
020 |a 9780124166950  |q (electronic bk.) 
020 |a 0124166954  |q (electronic bk.) 
020 |a 1299821278  |q (electronic bk.) 
020 |a 9781299821279  |q (electronic bk.) 
020 |z 9780124166899 
020 |z 012416689X 
029 1 |a AU@  |b 000054875169 
029 1 |a CHNEW  |b 001011370 
029 1 |a DEBBG  |b BV042314341 
029 1 |a DEBSZ  |b 405350341 
029 1 |a DEBSZ  |b 431490899 
029 1 |a DEBSZ  |b 481275428 
029 1 |a GBVCP  |b 804888450 
029 1 |a NLGGC  |b 370198328 
029 1 |a NZ1  |b 15197933 
029 1 |a NZ1  |b 15702160 
029 1 |a DKDLA  |b 820120-katalog:999942682805765 
035 |a (OCoLC)857277436  |z (OCoLC)860943560  |z (OCoLC)1058949738 
037 |a 513378  |b MIL 
050 4 |a TK5105.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |2 ukslc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Network and system security /  |c edited by John R. Vacca. 
250 |a Second edition 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions. 
500 |a Includes index. 
505 0 |a Machine generated contents note: 1. Detecting System Intrusions / Almantas Kakareka -- 1. Introduction -- 2. Monitoring Key Files in the System -- 3. Security Objectives -- 4.0day Attacks -- 5. Good Known State -- 6. Rootkits -- 7. Low Hanging Fruit -- 8. Antivirus Software -- 9. Homegrown Intrusion Detection -- 10. Full-Packet Capture Devices -- 11. Out-of-Band Attack Vectors -- 12. Security Awareness Training -- 13. Data Correlation -- 14. SIEM -- 15. Other Weird Stuff on the System -- 16. Detection -- 17.Network-Based Detection of System Intrusions (DSIs) -- 18. Summary -- Chapter Review Questions/Exercises -- Exercise -- References -- 2. Preventing System Intrusions / Michael West -- 1. So, What is an Intrusion? -- 2. Sobering Numbers -- 3. Know Your Enemy: Hackers versus Crackers -- 4. Motives -- 5. The Crackers' Tools of the Trade -- 6. Bots -- 7. Symptoms of Intrusions -- 8. What Can You Do? -- 9. Security Policies -- 10. Risk Analysis -- 11. Tools of Your Trade -- 12. Controlling User Access 
505 0 |a 13. Intrusion Prevention Capabilities -- 14. Summary -- Chapter Review Questions/Exercises -- Exercise -- 3. Guarding Against Network Intrusions / Patrick J. Walsh -- 1. Traditional Reconnaissance and Attacks -- 2. Malicious Software -- 3. Defense in Depth -- 4. Preventive Measures -- 5. Intrusion Monitoring and Detection -- 6. Reactive Measures -- 7.Network-Based Intrusion Protection -- 8. Summary -- Chapter Review Questions/Exercises -- Exercise -- 4. Securing Cloud Computing Systems / Cem Gurkok -- 1. Cloud Computing Essentials: Examining the Cloud Layers -- 2. Software as a Service (SaaS): Managing Risks in the Cloud -- 3. Platform as a Service (PaaS): Securing the Platform -- 4. Infrastructure as a Service (IaaS) -- 5. Leveraging Provider-Specific Security Options -- 6. Achieving Security in a Private Cloud -- 7. Meeting Compliance Requirements -- 8. Preparing for Disaster Recovery -- 9. Summary -- Chapter Review Questions/Exercises -- Exercise -- References 
505 0 |a 5. Unix and Linux Security / Gerald Beuchelt -- 1. Unix and Security -- 2. Basic Unix Security Overview -- 3. Achieving Unix Security -- 4. Protecting User Accounts and Strengthening Authentication -- 5. Limiting Superuser Privileges -- 6. Securing Local and Network File Systems -- 7.Network Configuration -- 8. Improving the Security of Linux and Unix Systems -- 9. Additional Resources -- 10. Summary -- Chapter Review Questions/Exercises -- Exercise -- 6. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana -- 1. Introduction to Linux and Unix -- 2. Hardening Linux and Unix -- 3. Proactive Defense for Linux and Unix -- 4. Summary -- Chapter Review Questions/Exercises -- Exercise -- 7. Internet Security / Jesse Walker -- 1. Internet Protocol Architecture -- 2. An Internet Threat Model -- 3. Defending against Attacks on the Internet -- 4. Internet Security Checklist -- 5. Summary -- Chapter Review Questions/Exercises -- Exercise -- 8. Intranet Security / Bill Mansoor 
505 0 |a 1. Smartphones and Tablets in the Intranet -- 2. Security Considerations -- 3. Plugging the Gaps: NAC and Access Control -- 4. Measuring Risk: Audits -- 5. Guardian at the Gate: Authentication and Encryption -- 6. Wireless Network Security -- 7. Shielding the Wire: Network Protection -- 8. Weakest Link in Security: User Training -- 9. Documenting the Network: Change Management -- 10. Rehearse the Inevitable: Disaster Recovery -- 11. Controlling Hazards: Physical and Environmental Protection -- 12. Know Your Users: Personnel Security -- 13. Protecting Data Flow: Information and System Integrity -- 14. Security Assessments -- 15. Risk Assessments -- 16. Intranet Security Implementation Process Checklist -- 17. Summary -- Chapter Review Questions/Exercises -- Exercise -- 9. Local Area Network Security / Dr. Pramod Pandya -- 1. Identify Network Threats -- 2. Establish Network Access Controls -- 3. Risk Assessment -- 4. Listing Network Resources -- 5. Threats -- 6. Security Policies 
505 0 |a 7. The Incident-Handling Process -- 8. Secure Design Through Network Access Controls -- 9. IDS Defined -- 10. NIDS: Scope and Limitations -- 11.A Practical Illustration of NIDS -- 12. Firewalls -- 13. Dynamic NAT Configuration -- 14. The Perimeter -- 15. Access List Details -- 16. Types of Firewalls -- 17. Packet Filtering: IP Filtering Routers -- 18. Application-Layer Firewalls: Proxy Servers -- 19. Stateful Inspection Firewalls -- 20. NIDS Complements Firewalls -- 21. Monitor and Analyze System Activities -- 22. Signature Analysis -- 23. Statistical Analysis -- 24. Signature Algorithms -- 25. Local Area Network Security Countermeasures Implementation Checklist -- 26. Summary -- Chapter Review Questions/Exercises -- Exercise -- 10. Wireless Network Security / Hongbing Cheng -- 1. Cellular Networks -- 2. Wireless Ad hoc Networks -- 3. Security Protocols -- 4. WEP -- 5. Secure Routing -- 6. ARAN -- 7. SLSP -- 8. Key Establishment -- 9. ING -- 10. Management Countermeasures -- 11. Summary 
505 0 |a Chapter Review Questions/Exercises -- Exercise -- References -- 11. Cellular Network Security / Kameswari Kotapati -- 1. Introduction -- 2. Overview of Cellular Networks -- 3. The State of the Art of Cellular Network Security -- 4. Cellular Network Attack Taxonomy -- 5. Cellular Network Vulnerability Analysis -- 6. Summary -- Chapter Review Questions/Exercises -- Exercise -- References -- 12. Rfid Security / Hongbing Cheng -- 1. RFID Introduction -- 2. RFID Challenges -- 3. RFID Protections -- 4. Summary -- Chapter Review Questions/Exercises -- Exercise -- References -- 13. Optical Wireless Security / Scott R. Ellis -- 1. Optical Wireless Systems Overview -- 2. Deployment Architectures -- 3. High Bandwidth -- 4. Low Cost -- 5. Implementation -- 6. Surface Area -- 7. Summary -- Chapter Review Questions/Exercises -- Exercise. 
504 |a Includes bibliographical references and index. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Vacca, John R. 
758 |i has work:  |a Network and system security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFxH9YxjVXgFMFhmtdrpRq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9780124166899 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1364061  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00058872 
938 |a EBSCOhost  |b EBSC  |n 596635 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26084490 
938 |a YBP Library Services  |b YANK  |n 11117827 
994 |a 92  |b IZTAP