Chapter 7. Security in Networks
In this chapter:
How networks differ from and are similar to single, stand-alone applications and environments
Threats against networked applications, including denial of service, web site defacements, malicious mobile code, and protocol attacks
Controls against network attacks: physical security, policies and procedures, and a range of technical controls
Firewalls: design, capabilities, limitations
Intrusion detection systems
Private e-mail: PGP and S/MIME
Networks—their design, development, and usage—are critical to computing, at least for the next few years. We interact with networks daily, if not more frequently, when we perform banking transactions, make telephone calls, or ride trains and planes. The utility ...
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.