Microsoft® Encyclopedia of Security

Microsoft® Encyclopedia of Security image
ISBN-10:

0735618771

ISBN-13:

9780735618770

Author(s): Tulloch, Mitch
Edition: 1
Released: Jul 16, 2003
Publisher: Microsoft Press
Format: Paperback, 480 pages
to view more data

Description:

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application—ready answers to help maximize security for your mission-critical systems and data.

  • Know your vulnerabilities—understand the ways black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks.
  • Deploy your best defense—review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics.
  • Stay one step ahead—keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.
  • Decipher security acronyms—from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.
  • Build your own network of resources—from professional associations and standards organizations to online communities and links to free information, know how to stay current.
  • Get an edge in certification preparation—ideal reference for anyone pursuing Security+, MCSE, CISSP, GIAC, and other professional certifications.

Entries include:

  • Advanced Encryption Standard
  • backdoors
  • CERT/CC
  • cookie poisoning
  • digital rights management
  • dynamic packet filtering
  • E-SIGN Act
  • file slack
  • hacking
  • honeypots
  • ICMP tunneling
  • IPSec
  • John the Ripper
  • keystroke logging
  • L2TP
  • L0phtCrack
  • managed security service providers
  • message digests
  • NIAP
  • Nmap
  • Qchain
  • one-time passwords
  • password cracking
  • PKI
  • port scanning
  • privacy
  • reverse Telnet
  • Safe Harbor Agreement
  • spoofing
  • Tcp_wrapper
  • Trin00
  • UDP scanning
  • viruses
  • wardriving
  • Windows cryptographic API
  • XML signatures
  • Web services security
  • worms
  • zombie zapper
  • and more

Low Price Summary






Top Bookstores


























We're an Amazon Associate. We earn from qualifying purchases at Amazon and all stores listed here.

DISCLOSURE: We're an eBay Partner Network affiliate and we earn commissions from purchases you make on eBay via one of the links above.

Want a Better Price Offer?

Set a price alert and get notified when the book starts selling at your price.

Want to Report a Pricing Issue?

Let us know about the pricing issue you've noticed so that we can fix it.