Synopses & Reviews
Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. This book can be used in executive training programs, or by anyone interested in learning the practical side of IT security.
Table of Contents
1. DOS Commands
2. Windows Security ‘
3. Web Security
4. Porn & Spam Filters
5. Monitoring Software
6. Password Auditors
7. Wireless
8. Security Readings
9. Information Gathering
10. Packet Sniffer
11. Port & Vulnerability Scanners
12. Honeypots and IDS
13. File Integrity Checkers & System Monitors
14. Alternate Data Streams
15. Data Recovery & Secure Deletion
16. Cryptography
17. Steganography
18. Forensics
19. Application Security
20. Linux Primer
21. Securing Web Servers
22. Utilities & Other
23. IT Security Distributions
24. Mobile Security
Appendix A. Antivirus
Appendix B. Software Links