The CERT Guide to System and Network Security Practices
Addison Wesley (Verlag)
978-0-201-73723-3 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Now, the world's leading information security response organization has written the ultimate guide to system and network security for working administrators. SEI's Computer Emergency Response Team (CERT) offers a practical, start-to-finish approach to developing secure networks, covering every stage of the process: planning, implementation, maintenance, intrusion detection, response, recovery, and beyond. Reflecting CERT's role as the world's #1 computer security response team, this book presents up-to-the-minute information on new attacks, viruses, and other IT security threats. Coverage includes: establishing effective security practices and policies, deploying firewalls, securing network servers and public web servers, security desktop workstations, intrusion detection, response, and recovery. This book not only shows how to enhance computer security today: it shows how to learn from experience to build even more secure systems tomorrow. For all system and network professionals, and other IT professionals concerned with security.
Julia H. Allen is a senior member of the technical staff within the CERTProgram at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. In addition to her work in software security and assurance, Allen is engaged in developing and transitioning executive outreach programs in enterprise security and governance. She is the author of The CERT Guide to System and Network Security Practices (Addison-Wesley, 2001), Governing for Enterprise Security (CMU/SEI, 2005), and the CERT Podcast Series: Security for Business Leaders (2006/2007).
Preface.
1. The Handbook of System and Network Security Practices.
I. SECURING COMPUTERS.
2. Securing Network Servers and User Workstations.
3. Securing Public Web Servers.
4. Deploying Firewalls.
II. INTRUSION DETECTION AND RESPONSE.
5. Setting Up Intrusion Detection and Response Practices.
6. Detecting Signs of Intrusion.
7. Responding to Intrusions.
Appendix A. Security Implementations.
Appendix B. Practice-Level Policy Considerations.
Index.
Erscheint lt. Verlag | 4.7.2001 |
---|---|
Verlagsort | Boston |
Sprache | englisch |
Maße | 240 x 188 mm |
Gewicht | 810 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-201-73723-X / 020173723X |
ISBN-13 | 978-0-201-73723-3 / 9780201737233 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich