CHAPTER 8
Security for Networked A/V Systems
CONTENTS
8.1.1 Viruses, Worms, Trojan Horses, and Malware
8.2.1 Developing a Security Plan for System Elements
8.2.2 The Window of Vulnerability
8.3.2 Intrusion Prevention Systems
8.3.3 Intrusion Detection System
8.3.4 Antivirus and Client Shell Software
8.3.5 The Virtual Private Network
8.3.6 Securing the Media Enterprise
8.4.1 Modern Encryption Methods
8.5 It’s a Wrap—Some Final Words
8.0 INTRODUCTION AND SCOPE
Information systems security has never been more critical. ...
Get Video Systems in an IT Environment, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.