Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780763726775 | 076372677X
- Cover: Paperback
- Copyright: 12/23/2004
A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language and reinforced by a large number of scenario-based exercises and practical review questions. Readers are then able to apply their knowledge through hands-on experience with computer security-related tools. Coverage begins with the basics of computer security (CIA and DAD triads, risk analysis, etc.), and moves quickly through to important, real-world topics such as access control methodologies, security principles and practices, business continuity planning and disaster recovery, firewalls, incident handling, and much more. In addition to providing the requisite material for a complete course in information security practices, the book can be used as a self-study guide for many of the basic security certifications.
Chapter 1 Introducing Computer and Network Security | 1 | (24) | |||
|
2 | (5) | |||
|
2 | (3) | |||
|
5 | (2) | |||
|
7 | (1) | |||
|
7 | (3) | |||
|
8 | (1) | |||
|
9 | (1) | |||
|
9 | (1) | |||
|
10 | (5) | |||
|
10 | (1) | |||
|
11 | (2) | |||
|
13 | (2) | |||
|
15 | (1) | |||
|
16 | (1) | |||
|
16 | (1) | |||
|
16 | (2) | |||
|
18 | (4) | |||
|
22 | (1) | |||
|
23 | (2) | |||
Chapter 2 Access Control Methodologies | 25 | (30) | |||
|
25 | (3) | |||
|
26 | (1) | |||
|
26 | (1) | |||
|
27 | (1) | |||
|
28 | (3) | |||
|
28 | (3) | |||
|
31 | (1) | |||
|
31 | (1) | |||
|
32 | (1) | |||
|
32 | (1) | |||
|
33 | (4) | |||
|
33 | (4) | |||
|
37 | (4) | |||
|
39 | (1) | |||
|
40 | (1) | |||
|
41 | (1) | |||
|
41 | (1) | |||
|
42 | (1) | |||
|
42 | (1) | |||
|
42 | (2) | |||
|
42 | (1) | |||
|
43 | (1) | |||
|
44 | (1) | |||
|
44 | (1) | |||
|
45 | (3) | |||
|
48 | (4) | |||
|
52 | (1) | |||
|
53 | (2) | |||
Chapter 3 General Security Principles and Practices | 55 | (28) | |||
|
56 | (5) | |||
|
57 | (1) | |||
|
58 | (1) | |||
|
59 | (1) | |||
|
59 | (2) | |||
|
61 | (8) | |||
|
62 | (4) | |||
|
66 | (3) | |||
|
69 | (1) | |||
|
69 | (1) | |||
|
70 | (1) | |||
|
70 | (3) | |||
|
71 | (1) | |||
|
72 | (1) | |||
|
72 | (1) | |||
|
73 | (1) | |||
|
74 | (1) | |||
|
75 | (1) | |||
|
76 | (3) | |||
|
79 | (1) | |||
|
80 | (3) | |||
Chapter 4 The Business of Security | 83 | (26) | |||
|
84 | (1) | |||
|
85 | (3) | |||
|
86 | (1) | |||
|
87 | (1) | |||
|
88 | (1) | |||
|
88 | (7) | |||
|
89 | (1) | |||
|
89 | (2) | |||
|
91 | (3) | |||
|
94 | (1) | |||
|
95 | (1) | |||
|
95 | (3) | |||
|
95 | (1) | |||
|
96 | (1) | |||
|
96 | (2) | |||
|
98 | (1) | |||
|
99 | (1) | |||
|
99 | (2) | |||
|
99 | (1) | |||
|
99 | (1) | |||
|
100 | (1) | |||
|
100 | (1) | |||
|
100 | (1) | |||
|
100 | (1) | |||
|
101 | (1) | |||
|
101 | (1) | |||
|
102 | (4) | |||
|
106 | (1) | |||
|
106 | (3) | |||
Chapter 5 Cryptographic Technologies | 109 | (26) | |||
|
110 | (2) | |||
|
110 | (1) | |||
|
110 | (1) | |||
|
111 | (1) | |||
|
111 | (1) | |||
|
112 | (8) | |||
|
113 | (4) | |||
|
117 | (2) | |||
|
119 | (1) | |||
|
120 | (2) | |||
|
120 | (2) | |||
|
122 | (1) | |||
|
122 | (2) | |||
|
123 | (1) | |||
|
123 | (1) | |||
|
124 | (1) | |||
|
124 | (1) | |||
|
125 | (1) | |||
|
126 | (4) | |||
|
130 | (3) | |||
|
133 | (2) | |||
Chapter 6 Securing TCP/IP | 135 | (30) | |||
|
136 | (12) | |||
|
136 | (6) | |||
|
142 | (6) | |||
|
148 | (4) | |||
|
149 | (3) | |||
|
152 | (1) | |||
|
152 | (2) | |||
|
153 | (1) | |||
|
154 | (1) | |||
|
154 | (2) | |||
|
155 | (1) | |||
|
155 | (1) | |||
|
156 | (1) | |||
|
157 | (1) | |||
|
158 | (4) | |||
|
162 | (2) | |||
|
164 | (1) | |||
Chapter 7 Handling Security Incidents | 165 | (26) | |||
|
166 | (3) | |||
|
166 | (3) | |||
|
169 | (1) | |||
|
169 | (2) | |||
|
170 | (1) | |||
|
171 | (2) | |||
|
173 | (1) | |||
|
174 | (1) | |||
|
175 | (1) | |||
|
176 | (1) | |||
|
176 | (1) | |||
|
176 | (1) | |||
|
177 | (1) | |||
|
177 | (1) | |||
|
177 | (1) | |||
|
177 | (36) | |||
|
177 | (1) | |||
|
178 | (1) | |||
|
178 | (1) | |||
|
179 | (1) | |||
|
179 | (1) | |||
|
179 | (1) | |||
|
179 | (1) | |||
|
180 | (1) | |||
|
180 | (2) | |||
|
182 | (1) | |||
|
183 | (4) | |||
|
187 | (2) | |||
|
189 | (2) | |||
Chapter 8 Firewall Security | 191 | (24) | |||
|
192 | (5) | |||
|
193 | (2) | |||
|
195 | (2) | |||
|
197 | (1) | |||
|
197 | (3) | |||
|
198 | (1) | |||
|
198 | (1) | |||
|
199 | (1) | |||
|
200 | (4) | |||
|
201 | (1) | |||
|
202 | (1) | |||
|
203 | (1) | |||
|
204 | (2) | |||
|
205 | (1) | |||
|
206 | (1) | |||
|
206 | (1) | |||
|
207 | (4) | |||
|
211 | (2) | |||
|
213 | (2) | |||
Chapter 9 Operating System Security | 215 | (32) | |||
|
216 | (1) | |||
|
217 | (2) | |||
|
219 | (1) | |||
|
220 | (1) | |||
|
221 | (2) | |||
|
223 | (3) | |||
|
226 | (1) | |||
|
227 | (2) | |||
|
227 | (1) | |||
|
228 | (1) | |||
|
228 | (1) | |||
|
229 | (1) | |||
|
230 | (2) | |||
|
232 | (2) | |||
|
234 | (1) | |||
|
234 | (1) | |||
|
235 | (1) | |||
|
236 | (1) | |||
|
237 | (1) | |||
|
238 | (4) | |||
|
242 | (2) | |||
|
244 | (3) | |||
Chapter 10 Securing Operating Systems | 247 | (28) | |||
|
248 | (1) | |||
|
249 | (1) | |||
|
250 | (1) | |||
|
251 | (9) | |||
|
252 | (8) | |||
|
260 | (2) | |||
|
260 | (1) | |||
|
261 | (1) | |||
|
262 | (1) | |||
|
262 | (2) | |||
|
263 | (1) | |||
|
264 | (1) | |||
|
264 | (1) | |||
|
265 | (1) | |||
|
266 | (1) | |||
|
266 | (2) | |||
|
268 | (3) | |||
|
271 | (2) | |||
|
273 | (2) | |||
Chapter 11 Security Audit Principles and Practices | 275 | (28) | |||
|
276 | (7) | |||
|
276 | (2) | |||
|
278 | (1) | |||
|
279 | (1) | |||
|
280 | (2) | |||
|
282 | (1) | |||
|
283 | (3) | |||
|
283 | (1) | |||
|
283 | (2) | |||
|
285 | (1) | |||
|
286 | (1) | |||
|
287 | (5) | |||
|
287 | (1) | |||
|
287 | (5) | |||
|
292 | (1) | |||
|
292 | (1) | |||
|
293 | (1) | |||
|
294 | (4) | |||
|
298 | (2) | |||
|
300 | (3) | |||
Chapter 12 Network and Server Attacks and Penetration | 303 | (22) | |||
|
304 | (6) | |||
|
305 | (2) | |||
|
307 | (3) | |||
|
310 | (4) | |||
|
310 | (3) | |||
|
313 | (1) | |||
|
314 | (3) | |||
|
314 | (1) | |||
|
315 | (1) | |||
|
315 | (1) | |||
|
315 | (1) | |||
|
316 | (1) | |||
|
317 | (1) | |||
|
318 | (1) | |||
|
318 | (4) | |||
|
322 | (1) | |||
|
323 | (2) | |||
Chapter 13 Intrusion Detection Systems and Practices | 325 | (28) | |||
|
326 | (2) | |||
|
328 | (2) | |||
|
330 | (1) | |||
|
331 | (8) | |||
|
333 | (1) | |||
|
334 | (5) | |||
|
339 | (2) | |||
|
341 | (1) | |||
|
342 | (1) | |||
|
343 | (1) | |||
|
343 | (2) | |||
|
345 | (3) | |||
|
348 | (2) | |||
|
350 | (3) | |||
Chapter 14 System Security Scanning and Discovery | 353 | (28) | |||
|
354 | (3) | |||
|
354 | (1) | |||
|
355 | (2) | |||
|
357 | (1) | |||
|
358 | (2) | |||
|
360 | (2) | |||
|
361 | (1) | |||
|
362 | (2) | |||
|
364 | (1) | |||
|
364 | (2) | |||
|
366 | (2) | |||
|
368 | (2) | |||
|
370 | (1) | |||
|
371 | (2) | |||
|
373 | (1) | |||
|
374 | (1) | |||
|
374 | (4) | |||
|
378 | (1) | |||
|
379 | (2) | |||
Appendix A Online Resources and Information | 381 | (6) | |||
|
381 | (1) | |||
|
382 | (1) | |||
|
382 | (1) | |||
|
382 | (1) | |||
|
383 | (1) | |||
|
384 | (1) | |||
|
384 | (1) | |||
|
385 | (1) | |||
|
386 | (1) | |||
Appendix B Security Tools and Software | 387 | (6) | |||
|
387 | (1) | |||
|
387 | (1) | |||
|
388 | (1) | |||
|
388 | (1) | |||
|
388 | (1) | |||
|
388 | (1) | |||
|
389 | (1) | |||
|
389 | (1) | |||
|
389 | (1) | |||
|
390 | (1) | |||
|
390 | (1) | |||
|
390 | (1) | |||
|
391 | (2) | |||
Appendix C Securing Windows, Step-by-Step | 393 | (20) | |||
|
393 | (2) | |||
|
394 | (1) | |||
|
394 | (1) | |||
|
394 | (1) | |||
|
395 | (1) | |||
|
396 | (2) | |||
|
398 | (4) | |||
|
402 | (4) | |||
|
406 | (3) | |||
|
409 | (1) | |||
|
410 | (1) | |||
|
411 | (2) | |||
Appendix D Glossary | 413 | (20) | |||
Index | 433 |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.