Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9781401882143 | 1401882145
- Cover: Paperback
- Copyright: 10/5/2004
Get the inside edge on the latest advances in the field of computer network security with the help of this new book! Comprehensive in scope, it is an essential guide to all facets of information security ranging from basic network technology to the broad applications of network security used in e-commerce, Internet security, and enterprise systems. Readers will learn about risk and threat analysis, as well as technologies such as access control, authentication, encryption and key distribution. Planning, installing, and operating a secure system is also covered. Highlights include lessons learned from September 11, 2001. Coverage concludes with a look at future trends, including global terror and proactive solutions.
Gordon F. Snyder is the Executive Director and Principal Investigator for the National Center for Telecommunications Technologies at Springfield Technical Community College.
Preface | xiii | ||||
Acknowledgments | xix | ||||
CHAPTER 1: From Teleprocessing to Client/Server Computing | 1 | (26) | |||
|
2 | (1) | |||
|
2 | (2) | |||
|
4 | (2) | |||
|
6 | (4) | |||
|
8 | (2) | |||
|
10 | (4) | |||
|
14 | (4) | |||
|
14 | (1) | |||
|
14 | (1) | |||
|
14 | (1) | |||
|
15 | (1) | |||
|
16 | (1) | |||
|
17 | (1) | |||
|
18 | (1) | |||
|
18 | (9) | |||
CHAPTER 2: Software, Operating Systems, and Applications | 27 | (44) | |||
|
29 | (19) | |||
|
29 | (4) | |||
|
33 | (1) | |||
|
34 | (1) | |||
|
34 | (3) | |||
|
35 | (2) | |||
|
37 | (2) | |||
|
39 | (2) | |||
|
39 | (2) | |||
|
41 | (1) | |||
|
42 | (2) | |||
|
44 | (1) | |||
|
45 | (3) | |||
|
48 | (2) | |||
|
48 | (2) | |||
|
50 | (4) | |||
|
51 | (2) | |||
|
53 | (1) | |||
|
54 | (1) | |||
|
55 | (1) | |||
|
56 | (1) | |||
|
56 | (1) | |||
|
56 | (1) | |||
|
56 | (1) | |||
|
57 | (4) | |||
|
60 | (1) | |||
|
60 | (1) | |||
|
61 | (1) | |||
|
61 | (10) | |||
CHAPTER 3: Computer Networks | 71 | (30) | |||
|
72 | (1) | |||
|
72 | (2) | |||
|
72 | (1) | |||
|
73 | (1) | |||
|
73 | (1) | |||
|
74 | (8) | |||
|
75 | (5) | |||
|
80 | (2) | |||
|
82 | (4) | |||
|
83 | (1) | |||
|
84 | (1) | |||
|
85 | (1) | |||
|
86 | (15) | |||
|
87 | (4) | |||
|
91 | (1) | |||
|
92 | (1) | |||
|
92 | (1) | |||
|
92 | (1) | |||
|
93 | (1) | |||
|
93 | (1) | |||
|
93 | (1) | |||
|
94 | (7) | |||
CHAPTER 4: LAN Protocols | 101 | (48) | |||
|
102 | (1) | |||
|
103 | (4) | |||
|
103 | (1) | |||
|
104 | (3) | |||
|
107 | (6) | |||
|
107 | (1) | |||
|
108 | (1) | |||
|
109 | (1) | |||
|
109 | (1) | |||
|
110 | (2) | |||
|
112 | (1) | |||
|
113 | (2) | |||
|
114 | (1) | |||
|
115 | (3) | |||
|
116 | (1) | |||
|
116 | (1) | |||
|
116 | (1) | |||
|
117 | (1) | |||
|
117 | (1) | |||
|
118 | (8) | |||
|
118 | (2) | |||
|
120 | (2) | |||
|
122 | (4) | |||
|
126 | (2) | |||
|
126 | (1) | |||
|
127 | (1) | |||
|
128 | (7) | |||
|
128 | (1) | |||
|
129 | (2) | |||
|
131 | (2) | |||
|
133 | (1) | |||
|
134 | (1) | |||
|
135 | (2) | |||
|
135 | (1) | |||
|
136 | (1) | |||
|
137 | (12) | |||
|
138 | (11) | |||
CHAPTER 5: TCP/IP and the Internet | 149 | (28) | |||
|
150 | (1) | |||
|
151 | (2) | |||
|
151 | (1) | |||
|
152 | (1) | |||
|
153 | (3) | |||
|
153 | (1) | |||
|
154 | (1) | |||
|
154 | (2) | |||
|
156 | (4) | |||
|
157 | (1) | |||
|
158 | (2) | |||
|
160 | (6) | |||
|
161 | (1) | |||
|
162 | (1) | |||
|
163 | (1) | |||
|
164 | (1) | |||
|
165 | (1) | |||
|
166 | (2) | |||
|
166 | (2) | |||
|
168 | (1) | |||
|
168 | (9) | |||
|
169 | (8) | |||
CHAPTER 6: Risk Analysis and Threat | 177 | (30) | |||
|
178 | (1) | |||
|
178 | (1) | |||
|
179 | (9) | |||
|
179 | (1) | |||
|
180 | (4) | |||
|
184 | (3) | |||
|
187 | (1) | |||
|
188 | (6) | |||
|
188 | (2) | |||
|
190 | (1) | |||
|
190 | (1) | |||
|
190 | (4) | |||
|
194 | (2) | |||
|
194 | (1) | |||
|
194 | (1) | |||
|
194 | (2) | |||
|
196 | (1) | |||
|
196 | (1) | |||
|
197 | (1) | |||
|
197 | (3) | |||
|
200 | (7) | |||
CHAPTER 7: Access Control and Authentication | 207 | (22) | |||
|
208 | (1) | |||
|
208 | (2) | |||
|
209 | (1) | |||
|
210 | (3) | |||
|
212 | (1) | |||
|
213 | (1) | |||
|
213 | (1) | |||
|
213 | (6) | |||
|
215 | (4) | |||
|
219 | (2) | |||
|
220 | (1) | |||
|
221 | (2) | |||
|
221 | (1) | |||
|
221 | (1) | |||
|
222 | (1) | |||
|
222 | (1) | |||
|
223 | (1) | |||
|
223 | (6) | |||
CHAPTER 8: The Technology of Security | 229 | (32) | |||
|
230 | (1) | |||
|
231 | (2) | |||
|
231 | (1) | |||
|
232 | (1) | |||
|
233 | (9) | |||
|
233 | (1) | |||
|
234 | (2) | |||
|
236 | (1) | |||
|
236 | (3) | |||
|
239 | (1) | |||
|
239 | (1) | |||
|
240 | (2) | |||
|
242 | (2) | |||
|
243 | (1) | |||
|
244 | (1) | |||
|
244 | (6) | |||
|
244 | (1) | |||
|
245 | (2) | |||
|
247 | (1) | |||
|
248 | (1) | |||
|
248 | (2) | |||
|
250 | (1) | |||
|
251 | (3) | |||
|
254 | (7) | |||
CHAPTER 9: Security at the Lower Levels | 261 | (26) | |||
|
262 | (1) | |||
|
263 | (2) | |||
|
264 | (1) | |||
|
265 | (4) | |||
|
265 | (2) | |||
|
267 | (2) | |||
|
269 | (3) | |||
|
272 | (2) | |||
|
274 | (1) | |||
|
274 | (2) | |||
|
276 | (11) | |||
|
276 | (4) | |||
|
280 | (7) | |||
CHAPTER 10: Upper-Level Security Services | 287 | (40) | |||
|
289 | (1) | |||
|
290 | (4) | |||
|
294 | (14) | |||
|
298 | (1) | |||
|
299 | (8) | |||
|
307 | (1) | |||
|
308 | (2) | |||
|
310 | (4) | |||
|
310 | (1) | |||
|
311 | (2) | |||
|
313 | (1) | |||
|
313 | (1) | |||
|
314 | (1) | |||
|
315 | (2) | |||
|
317 | (10) | |||
CHAPTER 11: Security Services in Business and Government | 327 | (34) | |||
|
329 | (2) | |||
|
331 | (1) | |||
|
332 | (3) | |||
|
335 | (1) | |||
|
335 | (3) | |||
|
337 | (1) | |||
|
338 | (3) | |||
|
340 | (1) | |||
|
341 | (1) | |||
|
342 | (1) | |||
|
343 | (3) | |||
|
343 | (1) | |||
|
344 | (2) | |||
|
346 | (1) | |||
|
347 | (3) | |||
|
348 | (1) | |||
|
348 | (1) | |||
|
349 | (1) | |||
|
350 | (1) | |||
|
350 | (1) | |||
|
350 | (11) | |||
CHAPTER 12: The Planning, Design, and Installation of Secure Systems | 361 | (30) | |||
|
362 | (7) | |||
|
364 | (2) | |||
|
366 | (1) | |||
|
367 | (1) | |||
|
368 | (1) | |||
|
369 | (3) | |||
|
369 | (1) | |||
|
369 | (1) | |||
|
370 | (1) | |||
|
371 | (1) | |||
|
372 | (3) | |||
|
372 | (1) | |||
|
373 | (1) | |||
|
374 | (1) | |||
|
375 | (4) | |||
|
375 | (1) | |||
|
376 | (2) | |||
|
378 | (1) | |||
|
379 | (1) | |||
|
379 | (2) | |||
|
379 | (1) | |||
|
380 | (1) | |||
|
380 | (1) | |||
|
381 | (10) | |||
|
382 | (1) | |||
|
382 | (9) | |||
CHAPTER 13: Operating a Successful and Secure System | 391 | (28) | |||
|
393 | (1) | |||
|
393 | (5) | |||
|
393 | (1) | |||
|
394 | (3) | |||
|
397 | (1) | |||
|
397 | (1) | |||
|
398 | (1) | |||
|
398 | (1) | |||
|
399 | (1) | |||
|
399 | (3) | |||
|
400 | (1) | |||
|
401 | (1) | |||
|
401 | (1) | |||
|
402 | (3) | |||
|
403 | (2) | |||
|
405 | (2) | |||
|
406 | (1) | |||
|
407 | (4) | |||
|
408 | (1) | |||
|
408 | (2) | |||
|
410 | (1) | |||
|
411 | (8) | |||
CHAPTER 14: The Future | 419 | (28) | |||
|
420 | (1) | |||
|
421 | (7) | |||
|
423 | (2) | |||
|
425 | (1) | |||
|
426 | (1) | |||
|
427 | (1) | |||
|
428 | (1) | |||
|
429 | (1) | |||
|
430 | (1) | |||
|
430 | (6) | |||
|
431 | (2) | |||
|
433 | (3) | |||
|
436 | (3) | |||
|
439 | (8) | |||
|
440 | (7) | |||
Glossary | 447 | (28) | |||
Index | 475 |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.