Surviving Security: How to Integrate People, Process and Technology
"Surviving Security" addresses a breadth of security technologies and processes, including policy, encryption, physical security, and maintenance, while continually answering the following questions that are critical to network administrators and managers: Why is this technology/practice important to a security infrastructure?How does this fit into the larger security layer model?What different options-technology and vendor-are available for this area (vendor-specific reviews will be placed primarily on the companion web site) and what is the cost of implementing these options?
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control administrators algorithms analyze Anson application architecture assets audit authentication bastion host buffer overflows changes Chapter client communications compromised configuration connection corporate network cost database denial-of-service attacks developed devices digital certificates digital signature discussed e-business e-mail employees encryption end user ensure environment exploits Figure files firewall functionality hacker host iButton implement information security installed integrity internal network Internet Internet Scanner IP addresses IPSec issues Kerberos layer Linux mail server malicious Microsoft monitoring operating system organization packet filter password perform perimeter security physical security port procedures programs protect protocol proxy server public key remote access requests router scan Scanner screening router scripts security infrastructure security policy single sign-on smart card specific threat tion traffic unauthorized vendors vulnerabilities Web server Windows workstation