Corporate Computer and Network Security / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Hardcover)
  • All (26) from $1.99   
  • New (4) from $7.97   
  • Used (22) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2014

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Hardcover New 0130384712 cover and corners may show creases and or shelf wear used books may be missing software or codes.

Ships from: Atlanta, GA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2008

Feedback rating:


Condition: New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


This textbook provides a framework for thinking about security, with attention to specific types of security problems and the tools for addressing them. Specific chapters discuss firewalls, host security, cryptography, application security, and incident and disaster response. Panko teaches that the University of Hawaii. Annotation (c)2003 Book News, Inc., Portland, OR
Read More Show Less

Product Details

  • ISBN-13: 9780130384713
  • Publisher: Prentice Hall
  • Publication date: 3/17/2003
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 544
  • Product dimensions: 7.10 (w) x 9.28 (h) x 0.99 (d)

Table of Contents

Preface xvii
About the Author xxii
Chapter 1 A Framework 1
Corporations at Risk 2
Attackers 11
Attacks 20
Penetration Attacks and Defenses 26
Security Management 31
The Plan-Protect-Respond (PPR) Cycle 34
The Book 40
Conclusion 41
Chapter 1A Examples of Security Problems 45
Introduction 45
Examples 45
The September 11 Disaster 52
Chapter 2 Access Control and Site Security 55
Introduction 56
Reusable Passwords 58
Building Security 70
Access Cards 74
Biometric Authentication 76
802.11 Wireless LAN (WLAN) Security 83
Conclusion 90
Chapter 3 Review of TCP/IP Internetworking 93
Introduction: A Review 94
Single Networks Versus Internets 94
TCP/IP Standards 94
Layer Cooperation 105
The Internet Protocol (IP) 109
Transmission Control Protocol (TCP) 121
User Datagram Protocol (UDP) 128
Internet Control Message Protocol (ICMP) for Supervisory Information 129
Conclusion 133
Chapter 4 Attack Methods 135
Introduction 136
Targeted Hacking Attacks (System Penetration/Break-Ins) 136
Denial-of-Service Attacks 155
Malware Attacks 161
Conclusion 170
Chapter 5 Firewalls 173
Introduction 174
Firewall Hardware and Software 177
Static Packet Filter Firewalls 182
Stateful Firewalls 189
Network Address Translation 194
Application Firewalls 196
Firewall Architectures 201
Configuring, Testing, and Maintaining Firewalls 208
Check Point and Cisco Systems Firewalls 210
Conclusion 213
Chapter 6 Host Security 215
Introduction 216
Installation and Patching 224
Turning Off Unnecessary Services 228
Managing Users and Groups 233
Managing Permissions 238
Advanced Server Hardening Techniques 243
Testing for Vulnerabilities 249
Hardening Clients 251
Palladium 253
Conclusion 254
Chapter 7 The Elements of Cryptography 255
Cryptographic Elements and Systems 256
Encryption for Confidentiality 256
Encryption for Confidentiality with Symmetric Key Encryption 259
Encryption for Confidentiality with Public Key Encryption 266
Encryption for Authentication 268
Digital Certificates 273
Symmetric Key Exchange 279
Replay Attacks and Defenses 282
Advanced Topics: Quantum Computing and Steganography 284
Conclusion 287
Chapter 8 Cryptographic Systems: SSL/TLS, VPNs, and Kerberos 289
Introduction 290
PPP 297
PPTP and L2TP 302
IPsec 307
Kerberos 315
Firewalls and Cryptographic Systems 320
Conclusion 321
Chapter 9 Application Security: Electronic Commerce and E-Mail 323
General Application Security Issues 324
Webservice and E-Commerce Security 330
E-Mail 345
Security Issues in Other Applications 354
Conclusion 357
Chapter 10 Incident and Disaster Response 359
Introduction 360
Backup 362
Intrusion Detection Systems (IDSs) 365
The Intrusion Response Process 382
Business Continuity Planning 389
Disaster Recovery 391
Conclusion 396
Chapter 11 Managing the Security Function 399
Introduction 400
Organization 400
Risk Analysis 409
Security Architecture 414
Control Principles 419
Managing Operations 422
Mobilizing Users 426
Vulnerability Testing 429
Conclusion 432
Chapter 12 The Broader Perspective 433
Introduction 434
Laws Governing Computer Crimes 434
Consumer Privacy 437
Employee Workplace Monitoring 449
Government Surveillance 456
Cyberwar and Cyberterror 460
Conclusion 469
Glossary 471
Index 501
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)