Network Security Bible
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control ActiveX activity administrator algorithm application assessment attack authentication backup bits browser certificate Chapter cipher text client communication configuration cookies cryptography database decrypt digital signature digital watermarking document domain name downloaded e-mail encryption ensure example Figure firewall functions hash hide honeypot host IDSs implementation information system security installed integrity Internet intrusion detection IP address layer mail server man-in-the-middle attack monitoring network security operating system organization packet password plain text POP3 port procedures protection protocol public key query request requirements response risk runlevel scripts secret key security controls security engineer session signatures SMTP steganography stego stream cipher techniques tion traffic transmitted types UNIX user’s virus viruses vulnerabilities watermark Web browser Web server Windows workstation wireless workstation