
Internet Security
A Jumpstart for Systems Administrators and IT Managers
- 398 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.¡Shield data from both the internal and external intruder¡Discover products that can detect and prevent these break-ins ¡Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses¡Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
The Internet and Security

1.1 The history of the Internet
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Foreword
- Acknowledgments
- Introduction
- Chapter 1: The Internet and Security
- Chapter 2: The Security Review Process
- Chapter 3: Cryptography
- Chapter 4: Secure Networks
- Chapter 5: Protecting Your Intranet from the Extranet and Internet
- Chapter 6: Authentication and Authorization
- Chapter 7: E-Commerce: Public Key Infrastructure
- Chapter 8: Messaging Security
- Chapter 9: What Are We Doing Here?
- Chapter 10: Disaster Recovery
- Appendix 1: Security Tools
- Appendix 2: The CERT Report
- Glossary
- References
- Index