Cyber-Security Policy: Foundation of your protection
Cryptography Primer
Securing Data with Symmetric Encryption
Solving Key Distribution issues with Asymmetric Encryption
Ensuring Integrity with Hashes
Verifying User and Host Identity
Assessing Traditional Static Password Schemes
Evaluating Strong Authentication Methods
Authenticating Hosts
Preventing System Intrusions
Discovering System Vulnerabilities
Encrypting Files for Confidentiality
Hardening the Operating System
Guarding Against Network Intrusions
Scanning for Vulnerabilities
Reducing Denial-of-Service (DOS) Attacks
Deploying Firewalls to Control Network Traffic
Protecting Web Service and Applications
Ensuring Network Confidentiality
Threats from the LAN
Confidentiality on External Connections
FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.
Reviews
There are no reviews yet.