Introduction to security and network forensics. ([2011])
- Record Type:
- Book
- Title:
- Introduction to security and network forensics. ([2011])
- Main Title:
- Introduction to security and network forensics
- Further Information:
- Note: William J. Buchanan.
- Other Names:
- Buchanan, William
- Contents:
- Introduction to Security; Objectives; The Industrial and the Information Age; CIA and AAA; Protecting against Intruders; Users, Systems, and Data; Services, Role-Based Security, and Cloud Computing; Security and Forensic Computing; ISO 27002; Risks; Risk Management/Avoidance; Security Policies; Defi ning the Policy; Example Risks; Defense-in-Depth; Gateways and DMZ (Demilitarized Zones); Layered Model and Security; Encryption and a Layered Approach to Defense; Software Tutorial—Data Packet Capture; Online Exercises; NetworkSims Exercises; Chapter Lecture; References Intrusion Detection Systems; Objectives; Introduction; Types of Intrusion; Attack Patterns; Host/Network-Based Intrusion Detection; Placement of the IDS; SNORT; Example Rules; Running Snort; User, Machine, and Network Profiling; Honey Pots; In-Line and Out-of-Line IDSs; False and True; Customized Agent-Based IDS; Tutorial; Software Tutorial; Snort Tutorial; Online Exercises; NetworkSims Exercises; Chapter Lecture; References Encryption; Objectives; Introduction; Simple Cipher Methods; Brute-Force Analysis; Public Key, Private Key, and Session Keys; Adding Salt; Private-Key Encryption; Encryption Classes; Public-Key Encryption; One-Way Hashing; Key Entropy; File Encryption; Tutorial; Software Tutorial; Web Page Exercises; Network Simulation Tutorial; Challenges; Online Exercises; NetworkSims Exercises; Chapter Lecture Authentication, Hashing, and Digital Certificates; Objectives; Introduction; Methods ofIntroduction to Security; Objectives; The Industrial and the Information Age; CIA and AAA; Protecting against Intruders; Users, Systems, and Data; Services, Role-Based Security, and Cloud Computing; Security and Forensic Computing; ISO 27002; Risks; Risk Management/Avoidance; Security Policies; Defi ning the Policy; Example Risks; Defense-in-Depth; Gateways and DMZ (Demilitarized Zones); Layered Model and Security; Encryption and a Layered Approach to Defense; Software Tutorial—Data Packet Capture; Online Exercises; NetworkSims Exercises; Chapter Lecture; References Intrusion Detection Systems; Objectives; Introduction; Types of Intrusion; Attack Patterns; Host/Network-Based Intrusion Detection; Placement of the IDS; SNORT; Example Rules; Running Snort; User, Machine, and Network Profiling; Honey Pots; In-Line and Out-of-Line IDSs; False and True; Customized Agent-Based IDS; Tutorial; Software Tutorial; Snort Tutorial; Online Exercises; NetworkSims Exercises; Chapter Lecture; References Encryption; Objectives; Introduction; Simple Cipher Methods; Brute-Force Analysis; Public Key, Private Key, and Session Keys; Adding Salt; Private-Key Encryption; Encryption Classes; Public-Key Encryption; One-Way Hashing; Key Entropy; File Encryption; Tutorial; Software Tutorial; Web Page Exercises; Network Simulation Tutorial; Challenges; Online Exercises; NetworkSims Exercises; Chapter Lecture Authentication, Hashing, and Digital Certificates; Objectives; Introduction; Methods of Authentication; Biometrics; Message Hash; Authenticating the Sender; Digital Certifi cates and PKI; HMAC (Hash Message Authentication Code); Future of Authentication Systems—Kerberos; Email Encryption; Tutorial; Software Tutorial; Online Exercises; Web Page Exercises; NetworkSims Exercises; Chapter Lecture; Reference Enhanced Software Security; Objectives; Introduction; Integrating Security into Applications; Good Practice; The Future of Software; .NET Environment—The Future of Security; Strengths of .NET; Global Assembly Cache (GAC); Strong Names; NET Security Model; Integrating Security into Applications; Web Service Security; NET Framework 3.0 (WinFX); Tutorial; Software Tutorial; Web Page Exercises; On-Line Exercises; NetworkSims Exercises; Chapter Lecture; References Network Security Elements ; Objectives; Introduction; Router (Packet Filtering) Firewalls; Network Address Translation; PIX/ASA Firewall; Proxy Servers; Tutorial; Web Page Exercises; Online Exercises; NetworkSims Exercises; Chapter Lecture Introduction to Risk; Objectives; Introduction; Security Taxonomy; Threats; Service-Oriented Infrastructures; Security Policies; Defining the Policy; Tutorial; Windows Service Tutorial; Linux Service Tutorial; ; Threat Analysis; Objectives; Introduction; Intruder Detection; Vulnerably Analysis; Hping; Botnets; Phishing; Active Attacks; Inference; Affiliate Scams; Password Cracking Programs; Tutorial; Vulnerability Tutorial; SQL Injection Tutorial; Appendix Network Forensics; Objectives; Introduction; The Key Protocols; Ethernet, IP, and TCP Headers; TCP Connection; ARP; SYN; Application Layer Analysis—FTP; ICMP; DNS; Port Scan; SYN Flood; Spoofed Addresses; Application Layer Analysis—HTTP; Network Logs on Hosts; Tripwire; Tutorial; Network Forensics Tutorial; Tripwire Tutorial Data Hiding and Obfuscation; Objectives; Introduction; Obfuscation Using Encryption; Obfuscation through Tunneling; Covert Channels; Watermarking and Stenography; Hiding File Contents; References; Tutorial; Exercises Web Infrastructures; Objectives; Introduction; Identity 2.0; SOAP over HTTP; LDAP; Authentication Infrastructures; 802.1x Authentication Infrastructure; OpenID; Kerberos; WS-*; Access Control; Tutorial; Practical Work; Exercises; Activities; Secure Server Setup Cloud/Grid Computing; Objectives; Introduction; Grid Computing; Cloud Computing; Amazon Web Services; Installing EC2 and S3 Command Tools; Activities Index … (more)
- Publisher Details:
- Boca Raton, Fla : Auerbach
- Publication Date:
- 2011
- Extent:
- 1 online resource (xv, 477 pages), illustrations
- Subjects:
- 005.8
Computer security
Computer networks -- Security measures
COMPUTERS / Security / General
Computer networks -- Security measures
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9781420013108
1420013106 - Related ISBNs:
- 084933568X
9780849335686
1420013106 - Notes:
- Note: Includes bibliographical references and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.144971
- Ingest File:
- 01_095.xml