search for books and compare prices
Tables of Contents for The Internet Security Guidebook
Chapter/Section Title
Page #
Page Count
Foreword
xi
 
Preface
xv
 
Acknowledgments
xvii
 
Copyright Notices and Statements
xix
 
Introduction Who Is Knocking at the Door?
1
6
Let's Do Business
7
12
Security Components
8
3
Do You Have a Process?
11
4
The Cost of Security
15
4
Security Review
19
24
Review the Business
19
4
What Is a Trusted Network?
23
4
Initial Risk Analysis
27
3
The Policy
30
7
Implementation and Feedback
37
6
Cryptography
43
22
History
43
3
Key Types
46
3
RSA--Public and Private Key
49
1
PKI and Business Solutions
50
15
Secure Networks
65
30
TCP/IP and OSI
65
12
Port of Call (Let's Go on a Cruise)
77
2
Denial-of-Service Attacks
79
3
Virtual Private Networks
82
3
Secure Sockets Layer (SSL)
85
10
Protecting Your Intranet from the Extranet and Internet
95
26
So Many Choices! I'll Get One of Each!
95
11
Firewall Product Functional Summaries
106
6
Firewall Buyer's Assessment Form
112
7
Firewall Vendors: Picking the Products That Are Right for You
119
2
Authentication
121
18
The Basics
121
2
Authentication
123
6
Authorization
129
8
Smart Cards
137
2
E-Commerce--Public Key Infrastructure (PKI)
139
26
PKI and You
139
2
X.509
141
5
Certificate Authority
146
6
Certification Practice Statement
152
4
Certificate Revocation List
156
1
Key Recovery
157
1
Lightweight Directory Access Protocol (LDAP)
158
3
Public Key Cryptography Standards
161
2
Public Key Infrastructure (X.509) Standards
163
2
Messaging Security
165
34
Safe Communication--Messaging
165
7
Getting Killed with Junk Mail
172
7
Keep It Running
179
20
What Are We Doing Here?
199
20
Risk Analysis
199
2
Where Are the Threats?
201
3
Technology Security Review
204
4
Control Directory and Environmental Risk Table
208
2
Competitive Asset
210
9
Let's Make the Plans
219
26
Security Plans, Policies, Procedures
219
2
The Corporate Security Policy Document
221
10
Physical Security Policy
231
4
Network Security Policy
235
6
Acceptable Use Policy
241
4
We Have Been Hacked! Oh, the Humanity!
245
10
Incident Handling
245
10
The Total Package Specific Steps
255
14
Putting It All Together
255
1
The Plan
256
5
Sample Plan to Roll Out PKI
261
8
Appendix 1 Security Tools
269
8
A1.1 Tools
269
5
A1.2 Other Tool URLs
274
3
Appendix 2 The CERT Report
277
28
CERT® Coordination Center Incident Reporting Guidelines
278
12
CERT/CC Contact Information
290
1
CERT® Coordination Center Windows NT Intruder Detection Checklist
291
12
CERT/CC Contact Information
303
2
Glossary
305
8
References
313
4
LDAP Standards RFCs
314
1
New Standard Adoption RFCs
314
1
PKIX Standards RFCs
315
1
Privacy Enhanced Mail and Cryptography (PEM) RFCs
316
1
Index
317