Network security: the complete reference
McGraw-Hill/Osborne, 2004 - Computers - 854 pages
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
80 pages matching encryption in this book
Results 1-3 of 80
What people are saying - Write a review
We haven't found any reviews in the usual places.
Network Security Overview
Risk Analysis and Defense Models
Security Policy Development
37 other sections not shown
Other editions - View all
access control access point algorithm allow application assets attack audit authentication backup Bluetooth certificate client communications configuration connections corporate create database default detection devices document domain e-mail employees encryption enforcement ensure example Figure filters firewall functions hacker host ICMP identify IDSs implementation information security infrastructure installed interface Internet IP address IPSec J2EE layer login MAC address malicious Microsoft monitor network security operating system organization packet password patches POP3 port problems protect protocol proxy public key remote access require response risk router scan script security controls security policy session signature smart card SMTP specific system administrators TCP Wrappers TCP/IP threat traffic trust types unauthorized Unix updates vendors virus vulnerabilities web server Windows Server 2003 wireless LAN wireless network workstation