Internet Security Dictionary

Internet Security Dictionary
Author: Vir V. Phoha
Publisher: Taylor & Francis
Total Pages: 279
Release: 2002-07-10
Genre: Computers
ISBN: 0387952616

The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English. The dictionary covers five main areas: authentication; network- level security; firewall design and implementation, and remote management; Internet security policies, risk analysis, integration across platforms, management and auditing, mobile code security Java/Active X/scripts, and mobile agent code; and security in Internet commerce.

The New Public Governance

The New Public Governance
Author: Stephen P. Osborne
Publisher: Routledge
Total Pages: 448
Release: 2010-01-21
Genre: Business & Economics
ISBN: 1135173273

Despite predictions that 'new public management' would establish itself as the new paradigm of Public Administration and Management, recent academic research has highlighted concerns about the intra-organizational focus and limitations of this approach. This book represents a comprehensive analysis of the state of the art of public management, examining and framing the debate in this important area. The New Public Governance? sets out to explore this emergent field of research and to present a framework with which to understand it. Divided into five parts, the book examines: Theoretical underpinnings of the concept of governance, especially competing perspectives from Europe and the US Governance of inter-organizational partnerships and contractual relationships Governance of policy networks Lessons learned and future directions Under the steely editorship of Stephen Osborne and with contributions from leading academics including Owen Hughes, John M. Bryson, Don Kettl, Guy Peters and Carsten Greve, this book will be of particular interest to researchers and students of public administration, public management, public policy and public services management.

A Guide to Understanding Security Modeling in Trusted Systems

A Guide to Understanding Security Modeling in Trusted Systems
Author:
Publisher: DIANE Publishing
Total Pages: 176
Release: 1993-05
Genre: Computers
ISBN: 9781568062969

Provides guidance on the construction, evaluation, and use of security policy models for automated information systems (AIS) used to protect sensitive and classified information. Includes an overview of a security modeling process and discusses techniques for security modeling techniques and specific systems, security levels and partially ordered sets, and available support tools. Also, philosophy of protection outline and security model outline. Glossary and references.

Guide to Understanding Design Documentation in Trusted Systems

Guide to Understanding Design Documentation in Trusted Systems
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Total Pages: 44
Release: 1995-10
Genre: Computers
ISBN: 9780788122309

A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.

Role-based Access Control

Role-based Access Control
Author: David Ferraiolo
Publisher: Artech House
Total Pages: 344
Release: 2003
Genre: Business & Economics
ISBN: 9781580533706

The authors explain role based access control (RBAC), its administrative and cost advantages, implementation issues and imigration from conventional access control methods to RBAC.

Practical UNIX and Internet Security

Practical UNIX and Internet Security
Author: Simson Garfinkel
Publisher: "O'Reilly Media, Inc."
Total Pages: 989
Release: 2003-02-21
Genre: Computers
ISBN: 1449310125

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.