Normal view MARC view ISBD view

Thinking security : stopping next year's hackers / Steven M. Bellovin.

By: Bellovin, Steven M [author.].
Series: Addison-Wesley professional computing series.New York, NY, USA : Addison-Wesley, ©2016Description: xv, 381 pages : 24 cm. illustrations.Content type: text. ISBN: 9780134277547 (hardcover : alk. paper).Subject(s): Computer networks -- Security measures | Computer securityDDC classification: 658.478/B41 Other classification: COECS/E
Contents:
Defining the problem. Introduction -- Thinking about security -- Threat models -- Technologies. Antivirus software -- Firewalls and intrusion detection systems -- Cryptography and VPNs -- Passwords and authentication -- PKI: Public Key Infrastructures -- Wireless access -- Clouds and virtualization -- Secure operations. Building secure systems -- Selecting software -- Keeping software up to date -- People -- System administration -- Security process -- The future. Case studies --Doing security properly.
Summary: You already know the endless list of security "do's and don'ts": run AV software and firewalls, lock everything down, encrypt everything, watch all your network traffic, follow checklists But even if you're spending a fortune doing all that, you're at greater risk than ever: even the world's most security-focused organizations are being victimized by massive attacks.
Item type Current location Collection Call number Status Date due Barcode
Books Books College Library
General Circulation Section
GC COECS/E 658.478/B41 (Browse shelf) Available 83764

Includes bibliographical references (pages 317-354) and index.

Defining the problem. Introduction -- Thinking about security -- Threat models -- Technologies. Antivirus software -- Firewalls and intrusion detection systems -- Cryptography and VPNs -- Passwords and authentication -- PKI: Public Key Infrastructures -- Wireless access -- Clouds and virtualization -- Secure operations. Building secure systems -- Selecting software -- Keeping software up to date -- People -- System administration -- Security process -- The future. Case studies --Doing security properly.

You already know the endless list of security "do's and don'ts": run AV software and firewalls, lock everything down, encrypt everything, watch all your network traffic, follow checklists But even if you're spending a fortune doing all that, you're at greater risk than ever: even the world's most security-focused organizations are being victimized by massive attacks.

In English.

There are no comments for this item.

Log in to your account to post a comment.