System Insecurity in the Internet Age
IEEE Software
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A Web-based quality management system and its implementation in a computer assembly industry
International Journal of Computer Applications in Technology
Hi-index | 0.00 |
From the Publisher:This comprehensive reference details how Internet and network security is implemented and explains ways you can keep it from being violated. Inadequacies in current security products and setups are pointed out and strategies to overcome them are detailed step by step. Security issues such as daemons, auditing, IP spoofing and sniffing, firewalls, encryption, Java security, CGI security, and viruses are covered in thorough detail. Hands-on instruction of security tools such as SATAN, Kerberos, and PGP is also included. Whether you're planning to implement an Internet security system or optimize an existing one, Internet Security Professional Reference has all the answers you need!