- Shopping Bag ( 0 items )
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.
Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.
Introduction to Internet Security.- Establishing Your Organization's Security.- Developing Your Security Policy.- Securing the Web Client.- Network Interconnections: A Major Point of Vulnerability.- Deterring Masqueraders and Ensuring Authenticity.- Preventing Eavesdropping to Protect your Privacy.- Thwarting Counterfeiters and Forgery to Retain Integrity.- Avoiding Disruption of Service to Maintain Availability.- Configuring Operating System and Network Security.- Enhancing Web Server Security.- Issuing and Managing Certificates.- Firewalls and Firewall Topologies.- Security Management Solutions and Future Directions.- Appendices.- Glossary.- Index.
Posted December 16, 2007
Again, John covers his book topic in a detailed manner. As a person involved in developing tools for client/server, web and mobile applications, this book provides a good insight into the various mechanisms available as well as the threats that have to be overcome. Well done, John.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted April 21, 2007
Internet is a significant resource for e-commerce activities as well as for dissemination of information and news. Resources on the Internet need to be secured against unauthorized access, for otherwise it could lead to loss of sensitive information resulting in business oppotunities lost. The author has laid out a systematic approach for identifying organizations security needs, and then defining security policies to safeguards those resources. The author revisits the vulnerabilities in the network protocols 'TCP/IP', and operating systems design. To remedy these vulnerabilities, tools such Intrusion Detection & Prevention, and Firewalls are prescribed. The author rightfully brings to the readers' attention that the web & domain name servers which are the heart and the soul of the Internet should be protected 24/7 from attacks such as DOS, DDOS, SYN flooding, spoofing to name the few, otherwise the services available on the Internet could be crashed. An excellent practical discussion on the use of Digital Certificates to secure and authenticate e-commerce activities is provided. Internet Security is a subject matter than can occupy volumes of written text, but the author has managed to capture the essence of practical aspects of security in one textbook, job done well. I would recommend this text to everyone that has access to Internet from home or business.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted April 20, 2007
The survival of a company or an organization these days depends on the expansion of its communications and its wider entry into the Internet and other available networks. Each additional step in this expansion further exposes the organization to its competitors and other entities that may not have the best interest of the organization in mind. For this reason security of its network and the development of its network¿s security policy should be the first step in its plan to use any network such as the Internet. This book is a well-written document and a good resource for those who are responsible for developing a practical approach in developing the needed security policy and its implementation.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted April 9, 2007
After reading John Vacca¿s book you will be able to implement a workable internet security policy to protect your computer information from theft, mischievous damage and unwanted intrusion. John gives real world examples and scenarios for you to learn which countermeasure to uses to stop a potential attack. This book is valuable to anyone using an internet website for them to be able to understand the types of external danger that could be inflicted to their computer assets. It is a well organized fifteen part book which provides you a step-by-step approach for your internet security needs and knowledge. John book also provides you an extensive security glossary of wireless and internet network terms and acronyms for your complete understanding of the latest terminology.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted April 4, 2007
After reading this book ANYONE would have a very good understanding of internet security. Vacca explains how to start up and then intergrate security to there network He address many different approches to keep internet networks secure. Many examples and scenarios are used. How to keep the 'bad guys' away is well covered throughout. Discussions on present as well as future problem solutions are very well discussed and covered. If you 'GOT INTERNET' you MUST read this book.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted February 23, 2007
This book covers the enitre range of internet security issues from the identification of threats, development and maintenance of web servers and firewalls as well as a discussion of future technologies that will improve internet security. This text is highly recommended for the networking professional and anyone planning to conduct business on the internet.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.