2007

Practical Internet Security

Authors:

ISBN: 978-0-387-40533-9 (Print) 978-0-387-29844-3 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xxi

  2. Introduction to Internet Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-26

      Internet Technologies

    3. No Access

      Book Chapter

      Pages 27-36

      Basic Security Issues

  3. Establishing Your Organization’s Security

    1. Front Matter

      Pages 37-37

    2. No Access

      Book Chapter

      Pages 39-46

      Real Threats That Impact Security

    3. No Access

      Book Chapter

      Pages 47-55

      A Security Policy: The Foundation of Your Protection

  4. Developing Your Security Policy

    1. Front Matter

      Pages 57-57

    2. No Access

      Book Chapter

      Pages 59-76

      Steps to Take Now

    3. No Access

      Book Chapter

      Pages 77-142

      Responding to Attacks

  5. Securing the Web Client

    1. Front Matter

      Pages 143-143

    2. No Access

      Book Chapter

      Pages 145-175

      Threats and Vulnerabilities

    3. No Access

      Book Chapter

      Pages 177-182

      Protecting Your Web Browser

  6. Network Interconnections: A Majorpoint of Vulnerability

    1. Front Matter

      Pages 183-183

    2. No Access

      Book Chapter

      Pages 185-192

      Basic Operating System and TCP/IP Concepts

    3. No Access

      Book Chapter

      Pages 193-201

      Early System Security Improvements

  7. Deterring Masqueraders and Ensuring Authenticity

    1. Front Matter

      Pages 203-203

    2. No Access

      Book Chapter

      Pages 205-209

      Impersonating Users

    3. No Access

      Book Chapter

      Pages 211-224

      How Masqueraders Infiltrate a System

    4. No Access

      Book Chapter

      Pages 225-231

      Holding Your Defensive Line

  8. Preventing Eavesdropping to Protect Your Privacy

    1. Front Matter

      Pages 233-233

    2. No Access

      Book Chapter

      Pages 235-241

      Unauthorized Listening and Looking

    3. No Access

      Book Chapter

      Pages 243-254

      Countering or not Countering the Eavesdropper: That’s the Question?

  9. Thwarting Counterfeiters and Forgery to Retain Integrity

    1. Front Matter

      Pages 255-255

    2. No Access

      Book Chapter

      Pages 257-267

      The Forger’s Arsenal

    3. No Access

      Book Chapter

      Pages 269-274

      Shielding your Assets

  10. Avoiding Disruption of Service to Maintain Availability

    1. Front Matter

      Pages 275-275

    2. No Access

      Book Chapter

      Pages 277-279

      Denial-of-Service Attacks

    3. No Access

      Book Chapter

      Pages 281-284

      Constructing Your Bastions

    4. No Access

      Book Chapter

      Pages 285-292

      The Importance of Firewalls

previous Page of 2