Jason Albanese, Wes Sonnenreich9780071415040, 0071415041
Table of contents :
Team DDU……Page 1
Contents……Page 7
Introduction……Page 19
Acknowledgments……Page 23
Connecting the Chapters……Page 25
Security and Business Processes……Page 26
The Harsh Truth……Page 28
The Security Philosophy……Page 30
The Security Policy……Page 32
Final Thoughts……Page 35
Technology Overview……Page 37
How the Security Assessment Works……Page 38
Final Thoughts……Page 42
Technology Overview……Page 43
How Systems and Network Monitoring Work……Page 44
Security Considerations……Page 45
Making the Connection……Page 46
Best Practices……Page 47
Final Thoughts……Page 48
Connecting the Chapters……Page 51
The Illusion of Outsourcing……Page 52
Outsourcing and Data Security……Page 53
Outsourcing Business Technology……Page 55
Outsourcing Business Services……Page 58
Outsourcing Security Services……Page 60
Final Thoughts……Page 61
Overview……Page 63
How Outsourced Monitoring Works……Page 64
Best Practices……Page 68
Final Thoughts……Page 69
Preventing Machine Failure……Page 71
Preventing Network Failure……Page 72
Preventing Data Loss……Page 73
Preventing Software Failure……Page 74
Preventing Repeat Disasters……Page 76
Final Thoughts……Page 77
Overview……Page 79
Policy……Page 80
Auditing……Page 81
Defensive Forensics……Page 82
Vulnerabilities……Page 83
Penetration Testing……Page 85
Final Thoughts……Page 86
Connecting the Chapters……Page 87
Protecting Your Digital Rights……Page 88
The Other Side of the Coin……Page 91
Putting It All Together……Page 92
Why Today’s Intellectual Property Laws Are Confusing……Page 93
Final Thoughts……Page 101
Technology Overview……Page 103
Security Considerations……Page 105
Best Practices……Page 108
Final Thoughts……Page 110
Technology Overview……Page 111
How Copy Protection Works……Page 112
Security Considerations……Page 115
Best Practices……Page 116
Final Thoughts……Page 117
Connecting the Chapters……Page 119
Introduction to Determining Identity……Page 120
Your Digital Identity in General……Page 121
Digital Identity: The Secure Way……Page 124
How Many Factors?……Page 125
Final Thoughts……Page 127
Technology Overview……Page 129
How Passwords Work……Page 131
Security Considerations……Page 132
Making the Connection……Page 134
Best Practices……Page 135
Final Thoughts……Page 137
Technology Overview……Page 139
How Digital Certificates Work……Page 141
Security Considerations……Page 142
Final Thoughts……Page 145
Technology Overview……Page 147
How Portable Identifiers Work……Page 148
Security Considerations……Page 150
Final Thoughts……Page 151
Technology Overview……Page 153
How Biometrics Work……Page 155
Security Considerations……Page 157
Making the Connection……Page 159
Best Practices……Page 160
Final Thoughts……Page 162
Connecting the Chapters……Page 163
What Is Privacy?……Page 164
How to Achieve Privacy……Page 165
Protecting Digital Privacy……Page 167
Protecting the Digital Privacy of Others……Page 169
Final Thoughts……Page 170
Technology Overview……Page 171
How a Mix Works……Page 173
Making The Connection……Page 176
Final Thoughts……Page 177
Technology Overview……Page 179
How Cookies and Spyware Work……Page 181
Security Considerations……Page 183
Best Practices……Page 185
Final Thoughts……Page 186
Technology Overview……Page 187
How Spam Management Works……Page 189
Security Considerations……Page 190
Best Practices……Page 191
Final Thoughts……Page 192
Connecting the Chapters……Page 193
One Computer, Two Computer, Red Computer……Page 194
Specialized Networks Need Specialized Hardware……Page 195
Networks: Power and Peril……Page 197
Connecting Correctly……Page 198
Final Thoughts……Page 201
Technology Overview……Page 203
How Routers Work……Page 209
Making the Connection……Page 210
Best Practices……Page 211
Final Thoughts……Page 212
Technology Overview……Page 213
How Radio Works……Page 214
How Spread Spectrum Works……Page 217
Security Considerations……Page 218
Making the Connection……Page 220
Best Practices……Page 221
Final Thoughts……Page 222
Technology Overview……Page 223
Security Considerations……Page 229
Best Practices……Page 231
Final Thoughts……Page 232
Connecting the Chapters……Page 233
Introduction to Hardening Networks……Page 234
There’s No Point in Closing the Barn Door After the Horse Has Left……Page 235
Out with the Bad, in with the Good……Page 236
More Harm than Good?……Page 237
Final Thoughts……Page 238
Technology Overview……Page 239
How Packet Filters Work……Page 246
Security Considerations……Page 248
Best Practices……Page 249
Final Thoughts……Page 252
Technology Overview……Page 253
How NAT Works……Page 256
Security Considerations……Page 258
Making the Connection……Page 259
Final Thoughts……Page 260
Technology Overview……Page 261
How VPNs Work……Page 262
IPSec Protocols……Page 264
Making the Connection……Page 265
Best Practices……Page 266
Final Thoughts……Page 267
Technology Overview……Page 269
How Traffic Shaping Works……Page 270
Security Considerations……Page 273
Best Practices……Page 274
Final Thoughts……Page 275
Connecting the Chapters……Page 277
Don’t Leave Me Unprotected……Page 278
Storage Caveats……Page 279
Storing Securely……Page 280
Summary……Page 281
Technology Overview……Page 283
Security Considerations……Page 284
Technology Overview……Page 287
How File Systems Work……Page 288
Security Considerations……Page 289
Best Practices……Page 291
Final Thoughts……Page 293
Technology Overview……Page 295
How NFS and SMB Work……Page 296
Security Considerations……Page 297
Best Practices……Page 298
Final Thoughts……Page 299
Technology Overview……Page 301
How Databases Work……Page 302
Security Considerations……Page 304
Best Practices……Page 306
Final Thoughts……Page 308
Connecting the Chapters……Page 309
Introduction to Hiding Information……Page 310
How Things Can Be Hidden……Page 311
How Hidden Things Are Found……Page 313
Final Thoughts……Page 314
Technology Overview……Page 315
Asymmetrical (Public Key) Cryptography……Page 318
How Cryptography Works……Page 319
Security Considerations……Page 320
Best Practices……Page 321
Final Thoughts……Page 322
Technology Overview……Page 325
Security Considerations……Page 326
Best Practices……Page 327
Final Thoughts……Page 328
Technology Overview……Page 329
How Steganography Works……Page 330
Security Considerations……Page 333
Best Practices……Page 335
Final Thoughts……Page 336
Connecting the Chapters……Page 337
The Burden of Choice……Page 338
Textual vs. Visual Access: UNIX and Windows……Page 340
Access Bold As Love……Page 341
Final Thoughts……Page 342
Technology Overview……Page 343
How Client/Server Applications Work……Page 347
Security Considerations……Page 348
Best Practices……Page 349
Final Thoughts……Page 350
The Web……Page 351
Email……Page 353
Security Considerations……Page 355
Best Practices……Page 356
Security Considerations……Page 357
News……Page 358
Security Considerations……Page 359
Final Thoughts……Page 360
Technology Overview……Page 361
How Remote Access Protocols Work……Page 364
Making the Connection……Page 366
Final Thoughts……Page 367
Technology Overview……Page 369
How P2P Works……Page 371
Security Considerations……Page 372
Final Thoughts……Page 374
Connecting the Chapters……Page 377
Putting Off the Inevitable……Page 378
The Anatomy of Redundancy……Page 379
Size Matters……Page 380
Final Thoughts……Page 381
Technology Overview……Page 383
How RAID Works……Page 384
Best Practices……Page 386
Final Thoughts……Page 388
Technology Overview……Page 389
How Clustering Works……Page 390
Security Considerations……Page 391
Best Practices……Page 392
Final Thoughts……Page 394
Technology Overview……Page 395
How Backup Works……Page 396
Security Considerations……Page 397
Best Practices……Page 398
Final Thoughts……Page 399
Connecting the Chapters……Page 401
Intrusion Detection Is an Art and a Science……Page 402
What’s a Hacker?……Page 403
The Vicious Cycle……Page 404
Final Thoughts……Page 405
Technology Overview……Page 407
How File Integrity Works……Page 408
Security Considerations……Page 409
Best Practices……Page 411
Final Thoughts……Page 412
Technology Overview……Page 413
Security Considerations……Page 416
Best Practices……Page 417
Final Thoughts……Page 418
Technology Overview……Page 419
Security Considerations……Page 421
Final Thoughts……Page 422
Technology Overview……Page 423
How Sniffers Work……Page 424
Security Considerations……Page 426
Best Practices……Page 427
Final Thoughts……Page 428
Technology Overview……Page 429
How Logs Work……Page 430
Best Practices……Page 432
Final Thoughts……Page 434
Index……Page 435
Reviews
There are no reviews yet.