Logo

Information Security and Privacy in Network Environments

Small book cover: Information Security and Privacy in Network Environments

Information Security and Privacy in Network Environments

Publisher: U.S. Government Printing Office
Number of pages: 248

Description:
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards and export controls; 2) guidance on safeguarding unclassified information in federal agencies; and 3) legal issues and information security, including electronic commerce, privacy, and intellectual property.

Home page url

Download or read it online for free here:
Download link
(5.4MB, PDF)

Similar books

Book cover: Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(10768 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(9887 views)
Book cover: Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(7165 views)
Book cover: Intrusion Detection with SNORTIntrusion Detection with SNORT
by - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(11047 views)