Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from the termi...
Chey Cobb, CISSP, has trained CIA and NSA personnel in computer security, held a Top Secret clearance for the U.S. intelligence community, and helped develop government security policies and procedures.
Introduction 1 Part I: The Path to Network Security 7 Chapter 1: Starting Down the Road to Network Security 9 Chapter 2: Evaluating and Documenting Your Network Situation 39 Chapter 3: Assessing the Risks 53 Chapter 4: Planning and Implementing Security Policies and Procedures 65 Part II: Your Network Is Your Business 83 Chapter 5: Choosing Controls without Breaking the Bank 85 Chapter 6: You Could Be Liable If 101 Chapter 7: Building a Secure Network from Scratch 117 Part III: The All-Important Security Mechanisms 127 Chapter 8: Anti-Virus Software 129 Chapter 9: Firewalls and Brimstone 141 Chapter 10: Intrusion Detection Systems 155 Chapter 11: Access Controls/Privileges 167 Part IV: Special Needs Networking 189 Chapter 12: When Patchwork Doesnt Mean Quilting: Unix Systems 191 Chapter 13: Boarding Up Your MS Windows 201 Chapter 14: Is Anything Eating Your Mac? 221 Chapter 15: Application Software Patching 233 Chapter 16: Very Precious Network Security 251 Chapter 17: Securing Your Wireless Network 261 Chapter 18: E-Commerce Special Needs 273 Part V: Dealing with the Unthinkable 287 Chapter 19: Emergency! Incident Response 289 Chapter 20: Disaster Recovery 305 Chapter 21: Who Did the Dirty: Computer Forensics 321 Part VI: The Part of Tens 335 Chapter 22: Ten Best Security Practices 337 Chapter 23: Ten Best Security Web Sites 345 Chapter 24: Ten Security Tools Every Network Security Geek Should Have 349 Chapter 25: Ten Questions to Ask a Security Consultant 353 Index 359