search for books and compare prices
Tables of Contents for Network Security
Chapter/Section Title
Page #
Page Count
Computer Weekly Professional Series
ix
 
Preface
xi
 
Acknowledgements
xii
 
Security assessment
1
12
The importance of network security
2
1
Network security is a business issue
3
2
Management through security policy
5
1
Defining the important issues
6
3
The aims of the book
9
1
Review
10
1
To do
11
1
References
12
1
Network operating systems, protocols and services
13
24
Network operating systems
13
1
Security features
14
3
Client / Server networking
17
1
Network protocol
18
1
TCP / IP
19
1
Network addressing
20
2
IP ports
22
2
The domain name system
24
2
The paradox of using TCP / IP
26
1
Common TCP / IP services
27
3
The seven layer model
30
3
Review
33
1
To do
34
3
The threats to a secure network
37
19
Introduction
37
1
Users: the threat from within!
38
2
Power supply failure
40
1
Viruses and Trojans
41
4
Denial of service
45
1
Intrusion and unauthorized access
46
2
Use for unauthorized purposes
48
2
Infringements of various legal Acts
50
1
Disasters and public disorder
50
2
Breach of confidentiality of data
52
1
Review
53
1
To do
54
2
Tools of the trade
56
20
Introduction
56
1
Tools that come with your operating system
57
5
Port scanners
62
3
Network scanners
65
1
Denial of service device applets
66
1
Email bombs
67
1
Back Orifice and BO Y2K
68
1
Password crackers
69
1
Network analysers
70
2
File integrity scanners
72
1
Network monitoring tools
73
1
Review
73
1
To do
74
2
Legal framework for network security
76
18
Which parts of the law are relevant to network security?
77
15
Review
92
1
To do
93
1
Gaining intelligence and taking action
94
11
Introduction
94
3
Usenet news groups
97
1
Specialist press
98
1
Events and seminars
98
1
Books
99
1
Taking action
99
3
Review
102
1
To do
103
1
Computer inventory template
103
2
Secure processes and system configuration
105
20
Introduction
105
1
Physical security
105
6
Personnel security
111
2
Support procedures
113
3
Secure configuration
116
6
Review
122
1
To do
123
2
Acceptable use
125
14
The notion of acceptable use
126
3
Uncontrolled software
129
2
Personal use
131
1
Acceptable use of email
131
2
Acceptable use of Usenet news
133
1
Acceptable use of the Web
134
1
Use of passwords
135
1
Private use
136
1
Review
137
1
To do
138
1
Business continuity
139
13
Data is your most valuable asset
140
1
What can go wrong?
140
1
Data backup
141
4
The importance of rehearsal!
145
1
The worst case scenario
146
1
Business continuity
147
2
Business continuity management
149
1
Review
150
1
To do
150
2
Firewalls
152
12
What exactly is a firewall?
153
2
Types of firewall
155
5
Limitations to firewalls
160
1
Do you need a firewall?
161
1
Review
162
1
To do
163
1
Content security
164
16
Programming and scripting languages
165
6
Text content
171
1
Images and multimedia
172
1
Protection measures
173
5
Review
178
1
To do
178
2
Security policy
180
30
Introduction
180
1
The need for a security policy
180
1
Aims and purposes of a security policy
181
1
Applicability
182
1
Ownership
183
1
Format
184
1
Benefits
185
1
Content
186
21
Security policy: the project overview
207
1
Implementation
208
1
Review
208
2
Index
210