Computer and Information Security Handbook - (Contents)
Computer and Information Security Handbook - (Contents)
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
vi Contents
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents vii
10. Eliminating the Security Weakness 7. Shielding the Wire: Network Protection 251
of Linux and Unix Operating 8. Weakest Link in Security: User Training 253
Systems 183 9. Documenting the Network: Change
Management 253
Mario Santana 10. Rehearse the Inevitable: Disaster
1. Introduction to Linux and Unix 183 Recovery 254
2. Hardening Linux and Unix 187 11. Controlling Hazards: Physical and
3. Proactive Defense for Linux and Unix 194 Environmental Protection 256
4. Summary 196 12. Know Your Users: Personnel Security 257
Chapter Review Questions/Exercises 196 13. Protecting Data Flow: Information and
Exercise 196 System Integrity 258
14. Security Assessments 258
15. Risk Assessments 259
11. Internet Security 197 16. Intranet Security Implementation
Process Checklist 260
Jesse Walker 17. Summary 260
1. Internet Protocol Architecture 197 Chapter Review Questions/Exercises 260
2. An Internet Threat Model 204 Exercise 261
3. Defending against Attacks on the
internet 209
4. Internet Security Checklist 221
14. Local Area Network Security 263
5. Summary 221 Dr. Pramod Pandya
Chapter Review Questions/Exercises 222
Exercise 222 1. Identify Network Threats 264
2. Establish Network Access Controls 264
3. Risk Assessment 265
12. The Botnet Problem 223 4. Listing Network Resources 265
5. Threats 265
Daniel Ramsbrock and Xinyuan Wang 6. Security Policies 265
1. Introduction 223 7. The Incident-Handling Process 266
2. Botnet Overview 224 8. Secure Design Through Network
3. Typical Bot Life Cycle 226 Access Controls 266
4. The Botnet Business Model 227 9. IDS Defined 267
5. Botnet Defense 228 10. NIDs: Scope and Limitations 267
6. Botmaster Traceback 232 11. A Practical Illustration of NIDS 268
7. Preventing Botnets 235 12. Firewalls 270
8. Summary 236 13. Dynamic NAT Configuration 274
Chapter Review Questions/Exercises 236 14. The Perimeter 274
Exercise 238 15. Access List Details 275
16. Types of Firewalls 276
Copyright © 2013. Elsevier Science & Technology. All rights reserved.
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
viii Contents
Part II
Copyright © 2013. Elsevier Science & Technology. All rights reserved.
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents ix
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
x Contents
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xi
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xii Contents
Terence Spies
43. Privacy-Enhancing Technologies 755
Simone Fischer-Hbner and Stefan Berthold
40. Password-based Authenticated
Key Establishment Protocols 705 1. The Concept of Privacy 755
2. Legal Privacy Principles 756
Jean Lancrenon, Dalia Khader, Peter Y.A. Ryan 3. Classification of PETs 757
and Feng Hao 4. Traditional Privacy Goals of PETs 758
1. Introduction to Key Exchange 705 5. Privacy Metrics 758
2. Password-Authenticated Key Exchange 709 6. Data Minimization Technologies 760
3. Concrete Protocols 711 7. Transparency-Enhancing Tools 767
4. Summary 718 8. Summary 770
Chapter Review Questions/Exercises 718 Chapter Review Questions/Exercises 770
Exercise 719 Exercise 771
References 719 References 771
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xiii
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xiv Contents
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xv
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xvi Contents
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
Contents xvii
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.
xviii Contents
Computer and Information Security Handbook, edited by John Vacca, and John R. Vacca, Elsevier Science & Technology, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/anahuac-ebooks/detail.action?docID=1195617.
Created from anahuac-ebooks on 2023-04-19 20:24:15.