The cover image may be different.

Corporate Computer Security

Hardcover - 07 January 2014
Rp 4,923,000 Rp 5,182,000
You Save: Rp 259,000 (5%)
No Hidden Cost
Or  10364 PEC Points
Currently Unavailable
If stock becomes available, email me at:

New Free Shipping.
* Terms and Conditions
Delivered in :

20 - 40 business days (Others)

Other items that might interest you

Description

Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools.

KEY TOPICS: The Threat Environment; Employee and Ex-employee Threats; Malware; Hackers and Attacks; The Criminal Era; Competitor Threats; Cyberwar and Cyberterror; Planning and Policy; Compliance Laws and Regulations; Organization Risk Analysis; Technical Security Architecture; Policy-Driven Implementation Governance Frameworks; Cryptography; What is Cryptography?; Symmetric Key Encryption Ciphers; Cryptographic System Standards; The Negotiation Stage; Initial Authentication Stage; The Keying Stage; Message-By-Message Authentication Quantum Security; Cryptographic Systems; SSL/TLS; IPsec; Secure Networks DoS Attacks; ARP Poisoning; Access Control for Networks; Ethernet Security;Wireless Security; Access Control; Physical Access and Security; Passwords; Access Cards and Tokens; Biometric Authentication; Cryptographic Authentication; Authorization; Auditing; Central Authentication Servers; Directory Servers; Full Identity Management; Firewalls; Static Packet Filtering; Stateful Packet Inspection; Network Address Translation; Application Proxy Firewalls and Content Filtering; Intrusion Detection Systems and Intrusion Prevention Systems; Antivirus Filtering and Unified Threat Management; Firewall Architectures Firewall Management; Firewall Filtering Problems; Host Hardening; Important Server Operating Systems; Vulnerabilities and Patches; Managing Users and Groups Managing Permissions; Creating Strong Passwords; Testing for Vulnerabilities; Application Security; Application Security And Hardening; WWW and E-Commerce Security; Web Browser Attacks; E-Mail Security; Voice over IP Security; Other User Applications; Data Protection; Data Protection: Backup; Backup Media and Raid; Data Storage Policies; Database Security; Data Loss Prevention; Incident and Disaster Response; The Intrusion Response Process For Major Incidents; Intrusion Detection Systems; Business Continuity Planning; It Disaster Recovery

MARKET For professionals seeking to gain the IT security skills they need for the workplace.

Customer Reviews


There are no reviews for this product.
Share your thoughts with other customers:
Write a Customer Review