ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
6
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,398
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security Management Handbook, Four Volume Set
Firewall Management and Internet Attacks
edited-book
Author(s):
Lt Jeffery Lowder
Publication date
(Online):
March 09 2010
Publisher:
Auerbach Publications
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
MANAGEMENT - Journal of Contemporary Management Issues
Most cited references
6
Record
: found
Abstract
: not found
Article
: not found
Security problems in the TCP/IP protocol suite
S. M. Bellovin
(1989)
0
comments
Cited
29
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
The Latest in Denial of Service Attacks: `Smurfing
A Huegen Craig
(1998)
0
comments
Cited
1
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Internet Security Professional Reference
Atkins Derek
(1997)
0
comments
Cited
1
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
October 20 2000
Publication date (Online):
March 09 2010
DOI:
10.1201/9780203325438.ch36
SO-VID:
caa3515e-6290-4991-bf59-f04f5115f9fa
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
Telecommunications and Network Security
Law, Investigation, and Ethics
Telecommunications And Network Security
Information Security Management Handbook
Making Security Awareness Happen
How to Perform a Security Review of a Checkpoint Firewall
Transport Layer Security
Operations Security
Telecommunications and Network Security
Applications and System Development Security
Applications and System Development Security
Relational Database Security
Business Continuity Planning and Disaster Recovery Planning
Firewalls, Ten Percent of the Solution
Applications and System Development Security
Enclaves
World Wide Web Application Security
An Introduction to IPSec
Business Continuity Planning and Disaster Recovery Planning
Information Security Management Handbook
Protecting a Network from Spoofing and Denial of Service Attacks
Single Sign-on for the Enterprise
Microcomputer and LAN Security
The Self-Hack Audit
Applications and System Development Security
Dial-Up Security Controls
The (In) Security of Virtual Private Networks
Law, Investigation, and Ethics
Biometrics
Physical Security
Directory Security
Applications and System Development Security
Applications and System Development Security
The International Dimensions of Cybercrime
Making Security Awareness Happen
Cryptography
Applications and System Development Security
Preventing DNS Attacks
Telecommunications and Network Security
Security and Network Technologies
Operations Security
Applications and System Development Security
Applications and System Development Security
Three New Models for the Application of Cryptography
Applications and System Development Security
Law, Investigation, and Ethics
Information Security Management Handbook
Access Control Systems and Methodology
Intrusion Detection
Protecting High-Tech Trade Secrets
Policy Development
Ownership and Custody of Data
Fundamentals of Cryptography and Encryption
Access Control Systems and Methodology
Hacker Tools and Techniques
Software Piracy
Telecommunications and Network Security
Applications and System Development Security
What’s Not So Simple about SNMP?
Protecting Against Dial-In Hazards
Telecommunications and Network Security
Applications and System Development Security
Access Control Systems and Methodology
Operations Security
Security Architecture and Models
Leveraging Virtual Private Networks
Organizing for Success
Security Architecture and Models
Purposes of Information Security Management
E-Mail Security
Information Warfare and the Information Systems Security Professional
Network Layer Security
Information Security Management Handbook
Policy Development
Ethics and the Internet
Information Security Management Handbook
Access Control Systems and Methodology
Security Architecture and Models
Evaluating the Security Posture of an Information Technology Environment
E-mail Security
Wireless LAN Security
Applications and System Development Security
Counter-Economic Espionage
Applications and System Development Security
Systems Integrity Engineering
Operations Security
Managing the Response to a Computer Security Incident
Business Continuity Planning
Methods of Attacking and Defending Cryptosystems
Certification and Accreditation Methodology
Managing Enterprise Security Information
Telecommunications and Network Security
Physical Security
Physical Security
Applications and System Development Security
A Look at Java Security
Testing Object-Based Applications
Law, Investigation, And Ethics
How to Work with a Managed Security Service Provider
Telecommunications and Network Security
The Human Side of Information Security
Operations Security
Operations Security
Firewall Management and Internet Attacks
Cryptography
Security Models for Object-Oriented Databases
New Perspectives on VPNs
Protecting Against Dial-In Hazards
Expanding Internet Support with IPv6
Law, Investigation, and Ethics
Information Security Management Handbook
Information Security Management Handbook
Security Management Practices
Cryptography
Risk Management and Analysis
Access Control Systems and Methodology
Information Security Management Handbook
Information Security Management Handbook
Principles and Applications of Cryptographic Key Management
Centralized Authentication Services (RADIUS, TACACS, DIAMETER)
IPSec Virtual Private Networks
Access Control Systems and Methodology
Access Control Systems and Methodology
A Framework for Certification Testing
It Is All about Control
Information Security and Personnel Practices
Access Control Systems and Methodology
An Introduction to Hostile Code and Its Control
An Introduction to Secure Remote Access
Telecommunications and Network Security
Law, Investigation, and Ethics
Operations Security
Roles and Responsibilities of the Information Systems Security Officer
Security Architecture and Models
Telecommunications and Network Security
Data Center Security
Telecommunications and Network Security
Information Security Management Handbook
Voice Security
Access Control Systems and Methodology
Computing Facility Physical Security
Computer Crime Investigation and Computer Forensics
Law, Investigation, and Ethics
Cryptography
E-mail Security Using Pretty Good Privacy
Social Engineering
Access Control Systems and Methodology
Information Security Management Handbook
Peoplesoft Security
Protecting the Portable Computing Environment
Access Control Systems and Methodology
Auditing the Electronic Commerce Environment
PKI Registration
Information Security Management Handbook
Internet Gripe Sites
Application Layer Security Protocols for Networks
Physical Security
Information Security Management Handbook
Telecommunications and Network Security
Telecommunications and Network Security
Information Security Management Handbook
The Building Blocks of Information Security
Securing New Information Technology
Managing Risk in an Intranet Environment
An Introduction to Cryptography
Security Architecture and Models
Law, Investigation, and Ethics
VPN Deployment and Evaluation Strategy
Applications and System Development Security
Applets and Network Security
An Examination of Firewall Architectures
Security Architecture and Models
Security Management for the World Wide Web
Considerations for Outsourcing Security
Operations Security
Mitigating e-Business Security Risks
Web Application Security
Security and Privacy for Data Warehouses
Liability For Lax Computer Security in DDOS Attacks
Malicious Code
Computer Crime Investigations
Operations Security
Security for Broadband Internet Access Users
Information Security Management Handbook
Getting Started with PKI
Telecommunications and Network Security
Access Control Systems and Methodology
Information Security Management Handbook
The Legal Issues of Disaster Recovery Planning
Single Sign-on
Security Management
Telecommunications and Network Security
Incident Response Management
Telecommunications and Network Security
Operations Security
Physical Security
How to Trap the Network Intruder
Information Security Management Handbook
Reflections on Database Integrity
Packet Sniffers and Network Monitors
Information Protection
The Perfect Security
The Reality of Virtual Computing
Access Control Systems and Methodology
Message Authentication
Telecommunications and Network Security
Information Security Management Handbook
Telecommunications and Network Security
Information Security Management Handbook
Applications and System Development Security
HIPAA 201
Applets and Network Security
Law, Investigation, and Ethics
Cryptography
Business Continuity in Distributed Environments
Law, Investigation, and Ethics
Secure & Managed Object-Oriented Programming
CIRT
Operations Security and Media Controls
Telecommunications and Network Security
Computer Ethics
Security Awareness Program
Law, Investigation, and Ethics
State Control of Unsolicited E-Mail
Introduction to Encryption
Hash Algorithms
A Matter of Trust
Cryptography
Controlling FTP
Computer Abuse Methods and Detection
Applications and System Development Security
Cookies and Web Bugs
Security Assessment
The Business Impact Analysis Process
Access Control Systems and Methodology
Operational Forensics
The Security Policy Lifecycle
References
Information Security Management Handbook
Law, Investigation, and Ethics
Configuration Management
Internet Security
Risk Analysis and Assessment
Operations Security
Telecommunications and Network Security
Applications and System Development Security
Breaking News
An Introduction to LAN/WAN Security
Privacy in the Healthcare Industry
Information Security Management Handbook
Cybercrime
Getting Started
Extranet Access Control Issues
Information Security Management Handbook
The Changing Face of Continuity Planning
Telecommunications and Network Security
Introduction to UNIX Security for Security Practitioners
Cryptography
Telecommunications and Network Security
Information Security Management Handbook
Improving Network Level Security through Real-time Monitoring and Intrusion Detection
Access Control Systems and Methodology
Information Security Management in the Healthcare Industry
Information Security Management Handbook
Physical Security
Applications and System Development Security
Access Control Systems and Methodology
Cryptography
Information Security Management Handbook
Physical Security
Implementation of Access Controls
Telecommunications and Network Security
Telecommunications and Network Security
Physical Security
Cyber-Risk Management
Closed-Circuit Television and Video Surveillance
Network Router Security
Law, Investigation, and Ethics
Telecommunications and Network Security
Security Architecture and Models
Firewalls
Information Security Management Handbook
Law, Investigation, and Ethics
The Case for Privacy
Intelligent Intrusion Analysis
Access Control Systems and Methodology
Telecommunications and Network Security
Law, Investigation, and Ethics
Malware and Computer Viruses
Information Security Management Handbook
Restoration Component of Business Continuity Planning
The Common Criteria for IT Security Evaluation
Cryptography
Cryptography
Telecommunications and Network Security
Reporting Security Breaches
When Technology and Privacy Collid
Cryptography
Common System Design Flaws and Security Issues
Cryptography
Information Security Management Handbook
Law, Investigation, and Ethics
Digital Signatures in Relational Database Applications
Security of Communication Protocols and Services
New Trends in Information Risk Management
Information Security Management Handbook
Information Security in the Enterprise
Information Security Management Handbook
Telecommunications and Network Security
Operations Security
Wireless Internet Security
A New Breed of Hacker Tools and Defenses
Telecommunications and Network Security
Law, Investigation, and Ethics
Overcoming Wireless LAN Security Vulnerabilities
Integrity and Security of ATM
Steganography
Telecommunications and Network Security
Cryptography
Steps for Providing Microcomputer Security
Physical Security
The RAID Advantage
Implementing Kerberos in Distributed Systems
Security Architecture and Models
Penetration Testing
Maintaining Management’s Commitment
Server Security Policies
XML and Information Security
Information Classification
Cryptography
Telecommunications and Network Security
Applications and System Development Security
Security Architecture and Models
Business Continuity Planning and Disaster Recovery Planning
Security Architecture and Models
Deploying Host-Based Firewalls across the Enterprise
Application Security
Information Security Management Handbook
Packet Sniffers
Law, Investigation, and Ethics
Information Security Management Handbook
Secured Connections to External Networks
ISPs and Denial-of-Service Attacks
Security Infrastructure
Biometric Identification
Reengineering the Business Continuity Planning Process
Business Continuity Planning and Disaster Recovery Planning
Data Marts and Data Warehouses
Preserving Public Key Hierarchy
What Happened?
Cryptography
Applications and System Development Security
Access Control Systems and Methodology
Enterprise Security Architecture
Physical Security
Comparing Firewall Technologies
Relational Database Access Controls Using SQL
Application Service Providers
Operations Security
Applications and System Development Security
Security for XML and Other Metadata Languages
Business Continuity Planning and Disaster Recovery Planning
Business Resumption Planning and Disaster Recovery
Wired and Wireless Physical Layer Security Issues
Secure Voice Communications (VoI)
Telecommunications and Network Security
Access Control Systems and Methodology
Information Security Management Handbook
Applications and System Development Security
Virtual Private Networks
Types of Information Security Controls
The Business Case for Information Security
Jurisdictional Issues in Global Transmissions
Similar content
3,398
Unruh-DeWitt detector response across a Rindler firewall is finite
Authors:
Building Firewalls or Floodgates Constitutional Design for the European Union*
Authors:
LORI THORLAKSON
,
Lori Thorlakson
Antivirus firewalls
Authors:
Helen W. Meyer
See all similar