Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
Contents at a Glance
Table of Contents
About the Author
Dedication
Acknowledgments
We Want to Hear from You!
Reader Services
Preface
Audience
Overview of the Book
Chapter 1. Introduction to Network Security
Introduction
The Basics of a Network
Basic Network Utilities
The OSI Model
What Does This Mean for Security?
Assessing Likely Threats to the Network
Classifications of Threats
Likely Attacks
Threat Assessment
Understanding Security Terminology
Choosing a Network Security Approach
Network Security and the Law
Using Security Resources
Summary
Test Your Skills
Chapter 2. Types of Attacks
Introduction
Understanding Denial of Service Attacks
Defending Against Buffer Overflow Attacks
Defending Against IP Spoofing
Defending Against Session Hacking
Blocking Virus and Trojan Horse Attacks
Summary
Test Your Skills
Chapter 3. Fundamentals of Firewalls
Introduction
What Is a Firewall?
Implementing Firewalls
Selecting and Using a Firewall
Using Proxy Servers
Summary
Test Your Skills
Chapter 4. Firewall Practical Applications
Introduction
Using Single Machine Firewalls
Windows 7
User Account Control
Linux Firewalls
Using Small Office/Home Office Firewalls
Using Medium-Sized Network Firewalls
Using Enterprise Firewalls
Summary
Test Your Skills
Chapter 5. Intrusion-Detection Systems
Introduction
Understanding IDS Concepts
Understanding and Implementing IDS Systems
Understanding and Implementing Honey Pots
Summary
Test Your Skills
Chapter 6. Encryption Fundamentals
Introduction
The History of Encryption
Learning About Modern Encryption Methods
Identifying Good Encryption
Understanding Digital Signatures and Certificates
Understanding and Using Decryption
Cracking Passwords
Steganography
Steganalysis
Exploring the Future of Encryption
Summary
Test Your Skills
Chapter 7. Virtual Private Networks
Introduction
Basic VPN Technology
Using VPN Protocols for VPN Encryption
IPSec
SSL
Implementing VPN Solutions
Summary
Test Your Skills
Chapter 8. Operating System Hardening
Introduction
Configuring Windows Properly
Configuring Linux Properly
Patching the Operating System
Configuring Browsers
Summary
Test Your Skills
Chapter 9. Defending Against Virus Attacks
Introduction
Understanding Virus Attacks
Virus Scanners
Antivirus Policies and Procedures
Additional Methods for Defending Your System
What to Do If Your System Is Infected by a Virus
Summary
Test Your Skills
Chapter 10. Defending Against Trojan Horses, Spyware, and Adware
Introduction
Trojan Horses
Spyware and Adware
Summary
Test Your Skills
Chapter 11. Security Policies
Introduction
Defining User Policies
Defining System Administration Policies
Defining Access Control
Defining Developmental Policies
Summary
Test Your Skills
Chapter 12. Assessing System Security
Introduction
Evaluating the Security Risk
Making the Initial Assessment
Probing the Network
Security Documentation
Summary
Test Your Skills
Chapter 13. Security Standards
Introduction
Using the Orange Book
Using the Rainbow Series
Using the Common Criteria
Using Security Models
U.S. Federal Regulations, Guidelines, and Standards
Summary
Test Your Skills
Chapter 14. Physical Security and Disaster Recovery
Introduction
Physical Security
Disaster Recovery
Ensuring Fault Tolerance
Test Your Skills
Chapter 15. Techniques Used by Attackers
Introduction
Preparing to Hack
The Attack Phase
Summary
Test Your Skills
Chapter 16. Introduction to Forensics
Introduction
General Forensics Guidelines
FBI Forensics Guidelines
Finding Evidence on the PC
Gathering Evidence from a Cell Phone
Forensic Tools to Use
Summary
Test Your Skills
Chapter 17. Cyber Terrorism
Introduction
Defending Against Computer-Based Espionage
Defending Against Computer-Based Terrorism
Choosing Defense Strategies
Summary
Test Your Skills
Appendix A. References
Chapter 1
Chapter 2
Chapter 4
Chapter 6
Chapter 7
Chapter 9
Chapter 10
Chapter 14
Glossary
Index
← Prev
Back
Next →
← Prev
Back
Next →