CONTENTS Cover Series Page Title Page Copyright Dedication Preface and Acknowledgments About the Companion Website Chapter 1: What is Security?
1.1 Introduction 1.2 The Subject of Security 1.3 A Twenty-First Century Tale 1.4 Why are You Important to Computer Security? 1.5 End of the Beginning 1.6 Chapter Summary 1.7 Further Reading and Resources
Chapter 2: Systems Engineering 2.1 So What is Systems Engineering? 2.2 Process Management 2.3 Organization Environments 2.4 Chapter Summary 2.5 Further Reading and Resources
Chapter 3: Foundation Concepts 3.1 Security Concepts and Goals 3.2 Role Of Cryptography In Information Security 3.3 Key Management Revisited 3.4 Chapter Summary 3.5 Further Reading and Resources
******ebook converter DEMO Watermarks*******
kindle:embed:0001?mime=image/jpg
Chapter 4: Authentication of Subjects 4.1 Authentication Systems 4.2 Human Authentication 4.3 Chapter Summary 4.4 Further Reading and Resources
Chapter 5: Security Systems Engineering 5.1 Security Policy Development 5.2 Senior Management Oversight and Involvement 5.3 Security Process Management and Standards 5.4 Information Security Systems Engineering Methodology 5.5 Requirements Analysis and Decomposition 5.6 Access Control Concepts 5.7 Security Modeling and Security-Related Standards 5.8 Chapter Summary
Chapter 6: Traditional Network Concepts 6.1 Networking Architectures 6.2 Types of Networks 6.3 Network Protocols 6.4 Chapter Summary 6.5 Further Reading and Resources
Chapter 7: Next-Generation Networks 7.1 Framework and Topology of the Ngn 7.2 The Ngn Functional Reference Model 7.3 Relationship Between Ngn Transport and Service Domains 7.4 Enterprise Role Model 7.5 Security Allocation Within the Ngn Transport Stratum Example 7.6 Converged Network Management (TMN and eTOM) 7.7 General Network Security Architectures 7.8 Chapter Summary
******ebook converter DEMO Watermarks*******
7.9 Further Reading and Resources Chapter 8: General Computer Security Architecture
8.1 The Hardware Protects the Software 8.2 The Software Protects Information 8.3 Element Security Architecture Description 8.4 Operating System (OS) Structure 8.5 Security Mechanisms for Deployed Operating Systems (OSs) 8.6 Chapter Summary 8.7 Further Reading and Resources
Chapter 9: Computer Software Security 9.1 Specific Operating Systems (OSs) 9.2 Applications 9.3 Chapter Summary 9.4 Further Reading and Resources
Chapter 10: Security Systems Design—Designing Network Security 10.1 Introduction 10.2 Security Design for Protocol Layer 1 10.3 Layer 2—Data Link Security Mechanisms 10.4 Security Design for Protocol Layer 3 10.5 IP Packet Authorization and Access Control 10.6 Chapter Summary 10.7 Further Reading and Resources
Chapter 11: Transport and Application Security Design and Use 11.1 Layer 4—Transport Security Protocols 11.2 Layer 5—User Service Application Protocols 11.3 Chapter Summary 11.4 Further Reading and Resources
Chapter 12: Securing Management and Managing Security 12.1 Securing Management Applications
******ebook converter DEMO Watermarks*******
12.2 Operation, Administration, Maintenance, and Decommissioning 12.3 Systems Implementation or Procurement 12.4 Chapter Summary 12.5 Further Reading and Resources
About the Author Glossary Index End User License Agreement
******ebook converter DEMO Watermarks*******
List of Tables Table 2.1
Table 2.2
Table 3.1
Table 3.2
Table 3.3
Table 3.4
Table 3.5
Table 3.6
Table 3.7
Table 3.8
Table 3.9
Table 3.10
Table 3.11
Table 3.12
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Table 4.5
Table 4.6
Table 4.7
Table 4.8
Table 5.1
Table 5.2 ******ebook converter DEMO Watermarks*******
Table 5.3
Table 5.4
Table 5.5
Table 5.6
Table 5.7
Table 5.8
Table 5.9
Table 5.10
Table 5.11
Table 5.12
Table 5.13
Table 5.14
Table 5.15
Table 5.16
Table 5.17
Table 5.18
Table 5.19
Table 5.20
Table 5.21
Table 5.22
Table 5.23
Table 5.24
Table 5.25
Table 5.26
Table 6.1
Table 6.2
******ebook converter DEMO Watermarks*******
Table 6.3
Table 6.4
Table 6.5
Table 6.6
Table 6.7
Table 6.8
Table 6.9
Table 6.10
Table 6.11
Table 6.12
Table 6.13
Table 6.14
Table 6.15
Table 6.16
Table 6.17
Table 6.18
Table 6.19
Table 6.20
Table 6.21
Table 6.22
Table 6.23
Table 6.24
Table 6.25
Table 6.26
Table 6.27
Table 6.28
******ebook converter DEMO Watermarks*******
Table 6.29
Table 6.30
Table 6.31
Table 6.32
Table 6.33
Table 7.1
Table 7.2
Table 8.1
Table 8.2
Table 8.3
Table 8.4
Table 8.5
Table 8.6
Table 8.7
Table 8.8
Table 8.9
Table 8.10
Table 8.11
Table 8.12
Table 8.13
Table 9.1
Table 9.2
Table 9.3
Table 9.4
Table 9.5
Table 9.6
******ebook converter DEMO Watermarks*******
Table 9.7
Table 9.8
Table 9.9
Table 9.10
Table 9.11
Table 9.12
Table 9.13
Table 9.14
Table 9.15
Table 9.16
Table 9.17
Table 9.18
Table 9.19
Table 9.20
Table 10.1
Table 10.2
Table 10.3
Table 10.4
Table 10.5
Table 10.6
Table 10.7
Table 10.8
Table 10.9
Table 10.10
Table 10.11
Table 10.12
******ebook converter DEMO Watermarks*******
Table 10.13
Table 10.14
Table 11.1
Table 11.2
Table 11.3
Table 11.4
Table 11.5
Table 11.6
Table 11.7
Table 11.8
Table 11.9
Table 11.10
Table 11.11
Table 11.12
Table 11.13
Table 11.14
Table 12.1
Table 12.2
Table 12.3
Table 12.4
Table 12.5
Table 12.6
Table 12.7
******ebook converter DEMO Watermarks*******
******ebook converter DEMO Watermarks*******
List of Illustrations Figure 1.1
Figure 1.2
Figure 2.1
Figure 2.2
Figure 2.3
Figure 2.4
Figure 2.5
Figure 2.6
Figure 3.1
Figure 3.2
Figure 3.3
Figure 3.4
Figure 3.5
Figure 3.6
Figure 3.7
Figure 3.8
Figure 3.9
Figure 3.10
Figure 3.11
Figure 3.12
Figure 3.13
Figure 3.14
Figure 3.15