MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

The complete guide to Internet security / Mark S. Merkow and James Breithaupt.

By: Merkow, Mark S.
Contributor(s): Breithaupt, Jim, 1955-.
Material type: materialTypeLabelBookPublisher: New York ; Brussels : AMACOM, c2000Description: x, 356 p. : ill. ; 24 cm. + hbk.ISBN: 081447070X.Subject(s): Internet -- Security measures | Computer securityDDC classification: 005.8
Contents:
Building a foundation for Information Security -- The Fundamental elements of Security -- Vulnerabilities to Internet-Attached Networks -- Hacking isn't beyond the corporate perimeter -- Peeking inside a hacker's toolbox -- Instrumental effects for Security Assurance -- Security Technologies -- Physical Security Control -- Logical Access Control -- Application layer security -- An introduction to cryptography -- Transport layer cryptography -- Digital signatures and PPK cryptography -- Key management considerations -- Multifactor Access Controls using cryptography -- Minding the store for the long run.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00077819
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00085871
Total holds: 0

Enhanced descriptions from Syndetics:

A comprehensive reference book on Internet security concepts, principles, and industry best practices - for readers who want to build a complete security blanket for their organizational networks.

Includes bibliographical references (pages 318-326) and index.

Building a foundation for Information Security -- The Fundamental elements of Security -- Vulnerabilities to Internet-Attached Networks -- Hacking isn't beyond the corporate perimeter -- Peeking inside a hacker's toolbox -- Instrumental effects for Security Assurance -- Security Technologies -- Physical Security Control -- Logical Access Control -- Application layer security -- An introduction to cryptography -- Transport layer cryptography -- Digital signatures and PPK cryptography -- Key management considerations -- Multifactor Access Controls using cryptography -- Minding the store for the long run.

Powered by Koha