The little black book of computer security / Joel Dubin
Por: Dubin, Joel
.
Tipo de material: 
Tipo de ítem | Biblioteca de origen | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras | Reserva de ejemplares |
---|---|---|---|---|---|---|---|---|
![]() |
Campus I | Colección General | 005.8 D814L 2008 (Navegar estantería) | Ej. 1 | Disponible | 090467 | ||
![]() |
Campus I | Colección General | 005.8 D814L 2008 (Navegar estantería) | Ej. 2 | Disponible | 090468 |
CAMPUS I
• What’s new in the second edition -- VII
• Chapter 1. Why read this book? -- 1
• Chapter 2. Grouping attacks into families -- 7
• Chapter 3. Assessing your system -- 11
• Chapter 4. Writing your security policy -- 19
• Chapter 5. Taking care of physical security -- 29
• Chapter 6. Managing human resources
• Chapter 7. Putting software access controls in place -- 47
• Chapter 8. Securing E-mail -- 59
• Chapter 9. Protecting your system against viruses, trojans, worms, and rootkits -- 71
• Chapter 10. Securing your web site -- 79
• Chapter 11. Defending your network perimeter and endpoints -- 93
• Chapter 12. Detecting intrusions -- 109
• Chapter 13. Responding to incidents -- 125
• Chapter 14. Recovering from disasters -- 137
• Chapter 15. Securing your wireless network -- 141
• Chapter 16. Writing secure programming code -- 145
• Chapter 17. Securing your infrastructure: Windows, UNIX, and linux -- 153
• Chapter 18. protecting privacy, preventing identity theft, and protecting children -- 167
• Chapter 19. Working with compliance auditors and regulators -- 173
• Chapter 20. Implementing a security-awareness training program -- 179
• Chapter 21. Entertaining a few words about encryption -- 183
• Chapter 22. Taking a look at future trends -- 181
• Appendix A). Short cheat sheet for computer security -- 195
• Appendix B). Web sites to check daily -- 201
• Appendix C). Tools of the trade -- 203
• Appendix D). Common TCP ports -- 205
• Appendix E). The ten commandments of computer security -- 207