[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[stalk:00494] [FYI] New Book: White-Hat Security Arsenal: Tackling the Threats



/FYI/

なんか出ているようです。

http://cseng.aw.com/book/0,3828,0201711141,00.html

White-Hat Security Arsenal: Tackling the Threats
by Aviel D. Rubin

ISBN: 0-201-71114-1  
Copyright: 2001   
Price: $ 44.99   
Binding: Paper   
Pages: 368   

Table of Contents
I. IS THERE REALLY A THREAT? 

1. Shrouded in Secrecy. 
2. Computer Security Risks. 
   What is at risk. 
   Why risks exist. 
   Exploiting risks. 
   Moving on. 

3. The Morris Worm Neets the Love Bug. The Evolution of Computer
   Viruses and Worms. 

   Terminology. 
   A touch of history. 
   The Morris Worm. 
   Melissa. 
   CIH Chernobyl. 
   Happy 99. 
   Worm.ExploreZip. 
   Bubbleboy. 
   Babylonia. 
   The Love Bug. 
   Summary. 

II. STORING DATA SECURELY. 

4. Local Storage. 

   Physical security. 
   Cryptographic security. 
   Protecting data with passwords. 
   Cryptographic file systems. 
   Case studies. 
   Further reading. 

5. Remote Storage. 

   Remote storage. 
   NFS security. 
   Adding security. 
   AFS. 
   Case study. 
   Further reading. 

6. Secure Backup. 

   Secure backups. 
   Physical security. 
   Backup over a network. 
   Key granularity. 
   Backup products. 
   Deleting backups. 
   Case study. 
   Further reading. 

III. SECURE DATA TRANSFER. 

7. Setting up a Long-Term Association. 

   What is identity? 
   Identity in cyberspace. 
   Exchanging public keys in person. 
   Certification authorities. 
   Certificate hierarchies. 
   Long-term relationships within an organization. 
   Global trust registry. 
   Revocation. 
   Long-term relationships in the wild. 
   Managing private keys. 
   Symmetric keys. 
   Case study. 
   Summary. 
   Further reading. 

8. Deriving Session Keys. 

   Long-term keys are not enough. 
   Picking a random key. 
   Session keys from symmetric long-term keys. 
   Session keys from long-term public keys. 
   Protocol design and analysis. 
   Case study. 
   Further reading. 

9. Communicating Securely After Key Setup. 

   Protecting information. 
   Which layer is best for security? 
   Replay prevention. 
   Case study. 
   Further reading. 

IV. PROTECTING AGAINST NETWORK THREATS. 

10. Protecting a Network Perimeter. 

   Insiders and outsiders. 
   Network perimeter. 
   Benefits of firewalls. 
   Types of firewalls. 
   Using the firewall. 
   Exit control. 
   Remote access. 
   Case study. 
   Further reading. 

11. Defending Against Attacks. 

   Bad guys. 
   Defense. 
   Case study. 
   Further reading. 

V. COMMERCE AND PRIVACY. 

12. Protecting E-Commerce Transactions. 

   Credit cards on the Web. 
   The SSL protocol. 
   Case study. 
   Further reading. 

13. Protecting Privacy. 

   Online privacy. 
   What is at risk? 
   E-mail privacy. 
   How is personal privacy compromised? 
   Defense mechanisms and countermeasures. 
   Case study. 
   Summary. 
   Further reading. 

Glossary. 
Index. 

----
こがよういちろう
--
- このメイリングリストに関する質問・問い合せ等は
- <security-talk@xxxxxxxxxx>までお知らせください
--
------------------------------------------------------------------------
     今日も雨ですねぇ。ブラウザに辞書機能なんていいですねー     
   http://toolbar.infoseek.co.jp/Tbar?pg=tbar_top.html&svx=971122