INTRODUCTION TO PART III

PREVENTION: TECHNICAL DEFENSES

The threats and vulnerabilities described in Part II can be met in part by effective use of technical countermeasures.

The chapter titles and topics in this part include:

  • 23. Protecting the Information Infrastructure. Facilities security and emergency management
  • 24. Operating System Security. Fundamentals of operating-systems security, including security kernels, privilege levels, access control lists, and memory partitions
  • 25. Local Area Networks. Security for local area networks, including principles and platform-specific tools
  • 26. Gateway Security Devices. Effective recommendations for implementing firewalls and proxy servers
  • 27. Intrusion Detection and Intrusion Prevention Devices. Critical elements of security management for measuring attack frequencies outside and inside the perimeter and for reducing successful penetrations
  • 28. Identification and Authentication. What one knows, what one has, what one is, and what one does
  • 29. Biometric Authentication. Special focus on who one is and what one does as markers of identity
  • 30. E-Commerce and Web Server Safeguards. Technological and legal measures underlying secure e-commerce and a systematic approach to developing and implementing security services
  • 31. Web Monitoring and Content Filtering. Tools for security management within the perimeter
  • 32. Virtual Private Networks and Secure Remote Access. Encrypted channels (virtual private networks) for secure communication, and ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.