Contents Chapter 1 Introduction Chapter 2 Domain 1: access control Chapter 3 Domain 2: telecommunicatons and network security Chapter 4 Domain 3: information security governance and risk management Chapter 5 Domain 4: software development security Chapter 6 Domain 5: cryptography Chapter 7 Domain 6: security architecture and design Chapter 8 Domain 7: operations security Chapter 9 Do…
Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …
Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…
Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …
Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.
Contents I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 6 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459
10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129
Why is Wireless Different? Introduction Protecting The Means Of Communication Protecting Privacy Promoting Safety The Personal and the Public Shaking Up the Status Quo Understanding wireless Forecasts Reasonable Degree of Security Regulatory Environments and Issues Security-Related Regulations Security Related Market Factors Guideliens for Security Measures Celluler Networka and B…
Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…
Table of Contents THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. …