Network Security
Academic Press Inc (Verlag)
978-0-12-638010-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This book offers critical and practical insight into one of the most important yet overlooked areas of systems management. Many corporations are in the process of changing their closed and proprietary information processing infrastructures to open, standards-based, integrated environments. The ability to maintain and extend security during this transition is of paramount importance to such organizations. Network Security is a practical guide to designing and implementing a variety of fundamental security mechanisms. The text defines specific cost-effective strategies and provides step-by-step implementation methodology. This book also provides in-depth coverage of controlling viruses and trojan horses, and presents advanced network security strategies for PC's, networked workstations, and high-performance systems. Fortified with this essential information, users can enjoy all the benefits of a network while securing confidential data.
Principles of distributed computing and networks - the network computing revolution, focus and objective, secure distributed processing, distributed systems elements structure for this book, distribution; the need for network security - information services and value, classified information, proprietary and sensitive information, total dependence, economics; the network security challenge - the fundamental paradox, reclusive and tightly held science, inadequate funding and management commitment, organizational opposition, operational opposition and costs, technical complexity and rapid change, a moving target, the lack of network security standards, legal inadequacies; network security services - security control objectives, continuity of operations services, integrity services, authentication services, access control services, confidentiality services, nonrepudiation services, assurance; network security disciplines - introduction - security engineering disciplines, physical security, personnel security, information security, TEMPEST, network and computer security, communications security, industrial security, operations security, life-cycle security engineering; network security approaches and mechanisms - the ISO/OSI reference model, network security services revisited, network security mechanisms, layering and placement of network security services and mechanisms, an example of a network security implementation; personal computer networking-security issues and approaches - introduction - the PC networking revolution, practical guidance for PC networking, PC physical security concerns, identification and authentication-network operating systems, application protection in a PC networking environment; controlling viruses and trojan horses - viruses, trojan horses, techniques for introducing a trojan horse into systems, exploitation, examples of trojan horses, identification of trojan horses, prevention, maintaining "Trojan Horse-Free" code; covert channels - the covert channel threat, general concepts, covert channel taxonomy, exploitation of covert channels, system vulnerabilities exploited by covert channels, covert channel analysis and measurement techniques, practice and examples, guidance to developers and evaluators, countermeasures, elimination of covert channels, damage confinement; practical approaches to network security - practical network security objectives, senior management commitment, network risk analysis, network security policy, security management personnel, network security-policies and procedures, maximize inherent security capabilities in design; advanced network security strategies - integrity - the new network security frontier, denial of service - dependence and reliability, maintainability, and availability, accountability, network security integration, network security standards, security overhead and transparency, high-performance systems. (Part contents).
Erscheint lt. Verlag | 1.1.1994 |
---|---|
Zusatzinfo | bibliography, index |
Verlagsort | San Diego |
Sprache | englisch |
Maße | 189 x 235 mm |
Gewicht | 685 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-12-638010-4 / 0126380104 |
ISBN-13 | 978-0-12-638010-1 / 9780126380101 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich