
Network Security JumpStart : Computer and Network Security Basics.
Title:
Network Security JumpStart : Computer and Network Security Basics.
Author:
Strebe, Matthew.
ISBN:
9780782152098
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (383 pages)
Contents:
Network Security JumpStart -- Acknowledgments -- Contents -- Introduction -- Who Should Read This Book? -- About This Book -- Book Features -- Chapter 1: Security Principles -- Why Computers Aren't Secure -- The History of Computer Security -- Security Concepts -- Chapter 2: Understanding Hacking -- What Is Hacking? -- Types of Hackers -- Vectors That Hackers Exploit -- Hacking Techniques -- Chapter 3: Encryption and Authentication -- Encryption -- Authentication -- Chapter 4: Managing Security -- Developing a Security Policy -- Implementing Security Policy -- Updating the Security Policy -- Chapter 5: Border Security -- Principles of Border Security -- Understanding Firewalls -- Selecting a Firewall -- Chapter 6: Virtual Private Networks -- Virtual Private Networking Explained -- Characteristics of VPNs -- Common VPN Implementations -- VPN Best Practices -- Chapter 7: Securing Remote and Home Users -- The Remote Security Problem -- Protecting Remote Machines -- Protecting against Remote Users -- Chapter 8: Virus Protection -- Understanding Viruses -- Virus Protection -- Implementing Virus Protection -- Chapter 9: Creating Fault Tolerance -- Causes for Loss -- Fault Tolerance Measures -- Chapter 10: Windows Security -- Windows Local Security -- Windows Network Security -- Chapter 11: Securing Unix Servers -- A Brief History of Unix -- Unix Security Basics -- File System Security -- Chapter 12: Unix Network Security -- Unix Network Security Basics -- Remote Logon Security -- Remote Access -- Distributed Logon -- File Sharing Security -- Firewalling Unix Machines -- Chapter 13: Web Server Security -- Web Security Problems -- Implementing Web Server Security -- Chapter 14: E-mail Security -- E-mail Encryption and Authentication -- Mail Forgery -- E-mail Viruses -- Attachment Security -- Spam -- Chapter 15: Intrusion Detection.
Intrusion Detection Systems -- Available IDS Systems -- Appendix A: Answers to Review Questions -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Appendix B: Glossary -- Index.
Abstract:
Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes:Understanding security principlesUnderstanding hackingUsing encryption and authenticationManaging securitySecuring Internet connectionsUsing Virtual Private NetworksSecuring remote and home usersImplementing virus protectionCreating fault toleranceSecuring Windows serversSecuring UNIX serversSecuring public web serversSecuring public e-mail serversDetecting intrusion.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Subject Term:
Genre:
Electronic Access:
Click to View