|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn857277436 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130830s2014 ne ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OCLCQ
|d OPELS
|d N$T
|d YDXCP
|d B24X7
|d UPM
|d OCLCF
|d UIU
|d DEBSZ
|d OCLCQ
|d ICA
|d AGLDB
|d ZCU
|d MERUC
|d OCLCQ
|d NJR
|d OCLCQ
|d U3W
|d D6H
|d OCLCQ
|d VTS
|d ICG
|d OCLCQ
|d STF
|d DKC
|d OCLCQ
|d DCT
|d VLB
|d DKDLA
|d CNSPO
|d K6U
|d Z5A
|d INT
|d AU@
|d COO
|d EYM
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 860943560
|a 1058949738
|
020 |
|
|
|a 9780124166950
|q (electronic bk.)
|
020 |
|
|
|a 0124166954
|q (electronic bk.)
|
020 |
|
|
|a 1299821278
|q (electronic bk.)
|
020 |
|
|
|a 9781299821279
|q (electronic bk.)
|
020 |
|
|
|z 9780124166899
|
020 |
|
|
|z 012416689X
|
029 |
1 |
|
|a AU@
|b 000054875169
|
029 |
1 |
|
|a CHNEW
|b 001011370
|
029 |
1 |
|
|a DEBBG
|b BV042314341
|
029 |
1 |
|
|a DEBSZ
|b 405350341
|
029 |
1 |
|
|a DEBSZ
|b 431490899
|
029 |
1 |
|
|a DEBSZ
|b 481275428
|
029 |
1 |
|
|a GBVCP
|b 804888450
|
029 |
1 |
|
|a NLGGC
|b 370198328
|
029 |
1 |
|
|a NZ1
|b 15197933
|
029 |
1 |
|
|a NZ1
|b 15702160
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999942682805765
|
035 |
|
|
|a (OCoLC)857277436
|z (OCoLC)860943560
|z (OCoLC)1058949738
|
037 |
|
|
|a 513378
|b MIL
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|2 ukslc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Network and system security /
|c edited by John R. Vacca.
|
250 |
|
|
|a Second edition
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Syngress,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Machine generated contents note: 1. Detecting System Intrusions / Almantas Kakareka -- 1. Introduction -- 2. Monitoring Key Files in the System -- 3. Security Objectives -- 4.0day Attacks -- 5. Good Known State -- 6. Rootkits -- 7. Low Hanging Fruit -- 8. Antivirus Software -- 9. Homegrown Intrusion Detection -- 10. Full-Packet Capture Devices -- 11. Out-of-Band Attack Vectors -- 12. Security Awareness Training -- 13. Data Correlation -- 14. SIEM -- 15. Other Weird Stuff on the System -- 16. Detection -- 17.Network-Based Detection of System Intrusions (DSIs) -- 18. Summary -- Chapter Review Questions/Exercises -- Exercise -- References -- 2. Preventing System Intrusions / Michael West -- 1. So, What is an Intrusion? -- 2. Sobering Numbers -- 3. Know Your Enemy: Hackers versus Crackers -- 4. Motives -- 5. The Crackers' Tools of the Trade -- 6. Bots -- 7. Symptoms of Intrusions -- 8. What Can You Do? -- 9. Security Policies -- 10. Risk Analysis -- 11. Tools of Your Trade -- 12. Controlling User Access
|
505 |
0 |
|
|a 13. Intrusion Prevention Capabilities -- 14. Summary -- Chapter Review Questions/Exercises -- Exercise -- 3. Guarding Against Network Intrusions / Patrick J. Walsh -- 1. Traditional Reconnaissance and Attacks -- 2. Malicious Software -- 3. Defense in Depth -- 4. Preventive Measures -- 5. Intrusion Monitoring and Detection -- 6. Reactive Measures -- 7.Network-Based Intrusion Protection -- 8. Summary -- Chapter Review Questions/Exercises -- Exercise -- 4. Securing Cloud Computing Systems / Cem Gurkok -- 1. Cloud Computing Essentials: Examining the Cloud Layers -- 2. Software as a Service (SaaS): Managing Risks in the Cloud -- 3. Platform as a Service (PaaS): Securing the Platform -- 4. Infrastructure as a Service (IaaS) -- 5. Leveraging Provider-Specific Security Options -- 6. Achieving Security in a Private Cloud -- 7. Meeting Compliance Requirements -- 8. Preparing for Disaster Recovery -- 9. Summary -- Chapter Review Questions/Exercises -- Exercise -- References
|
505 |
0 |
|
|a 5. Unix and Linux Security / Gerald Beuchelt -- 1. Unix and Security -- 2. Basic Unix Security Overview -- 3. Achieving Unix Security -- 4. Protecting User Accounts and Strengthening Authentication -- 5. Limiting Superuser Privileges -- 6. Securing Local and Network File Systems -- 7.Network Configuration -- 8. Improving the Security of Linux and Unix Systems -- 9. Additional Resources -- 10. Summary -- Chapter Review Questions/Exercises -- Exercise -- 6. Eliminating the Security Weakness of Linux and Unix Operating Systems / Mario Santana -- 1. Introduction to Linux and Unix -- 2. Hardening Linux and Unix -- 3. Proactive Defense for Linux and Unix -- 4. Summary -- Chapter Review Questions/Exercises -- Exercise -- 7. Internet Security / Jesse Walker -- 1. Internet Protocol Architecture -- 2. An Internet Threat Model -- 3. Defending against Attacks on the Internet -- 4. Internet Security Checklist -- 5. Summary -- Chapter Review Questions/Exercises -- Exercise -- 8. Intranet Security / Bill Mansoor
|
505 |
0 |
|
|a 1. Smartphones and Tablets in the Intranet -- 2. Security Considerations -- 3. Plugging the Gaps: NAC and Access Control -- 4. Measuring Risk: Audits -- 5. Guardian at the Gate: Authentication and Encryption -- 6. Wireless Network Security -- 7. Shielding the Wire: Network Protection -- 8. Weakest Link in Security: User Training -- 9. Documenting the Network: Change Management -- 10. Rehearse the Inevitable: Disaster Recovery -- 11. Controlling Hazards: Physical and Environmental Protection -- 12. Know Your Users: Personnel Security -- 13. Protecting Data Flow: Information and System Integrity -- 14. Security Assessments -- 15. Risk Assessments -- 16. Intranet Security Implementation Process Checklist -- 17. Summary -- Chapter Review Questions/Exercises -- Exercise -- 9. Local Area Network Security / Dr. Pramod Pandya -- 1. Identify Network Threats -- 2. Establish Network Access Controls -- 3. Risk Assessment -- 4. Listing Network Resources -- 5. Threats -- 6. Security Policies
|
505 |
0 |
|
|a 7. The Incident-Handling Process -- 8. Secure Design Through Network Access Controls -- 9. IDS Defined -- 10. NIDS: Scope and Limitations -- 11.A Practical Illustration of NIDS -- 12. Firewalls -- 13. Dynamic NAT Configuration -- 14. The Perimeter -- 15. Access List Details -- 16. Types of Firewalls -- 17. Packet Filtering: IP Filtering Routers -- 18. Application-Layer Firewalls: Proxy Servers -- 19. Stateful Inspection Firewalls -- 20. NIDS Complements Firewalls -- 21. Monitor and Analyze System Activities -- 22. Signature Analysis -- 23. Statistical Analysis -- 24. Signature Algorithms -- 25. Local Area Network Security Countermeasures Implementation Checklist -- 26. Summary -- Chapter Review Questions/Exercises -- Exercise -- 10. Wireless Network Security / Hongbing Cheng -- 1. Cellular Networks -- 2. Wireless Ad hoc Networks -- 3. Security Protocols -- 4. WEP -- 5. Secure Routing -- 6. ARAN -- 7. SLSP -- 8. Key Establishment -- 9. ING -- 10. Management Countermeasures -- 11. Summary
|
505 |
0 |
|
|a Chapter Review Questions/Exercises -- Exercise -- References -- 11. Cellular Network Security / Kameswari Kotapati -- 1. Introduction -- 2. Overview of Cellular Networks -- 3. The State of the Art of Cellular Network Security -- 4. Cellular Network Attack Taxonomy -- 5. Cellular Network Vulnerability Analysis -- 6. Summary -- Chapter Review Questions/Exercises -- Exercise -- References -- 12. Rfid Security / Hongbing Cheng -- 1. RFID Introduction -- 2. RFID Challenges -- 3. RFID Protections -- 4. Summary -- Chapter Review Questions/Exercises -- Exercise -- References -- 13. Optical Wireless Security / Scott R. Ellis -- 1. Optical Wireless Systems Overview -- 2. Deployment Architectures -- 3. High Bandwidth -- 4. Low Cost -- 5. Implementation -- 6. Surface Area -- 7. Summary -- Chapter Review Questions/Exercises -- Exercise.
|
504 |
|
|
|a Includes bibliographical references and index.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Vacca, John R.
|
758 |
|
|
|i has work:
|a Network and system security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFxH9YxjVXgFMFhmtdrpRq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 9780124166899
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1364061
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058872
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 596635
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26084490
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11117827
|
994 |
|
|
|a 92
|b IZTAP
|