 Hack Proofing Your IdentityThe use of a seal, card, or other identification while making a purchase or signing a contract is a custom almost as old as history. As merchants and their customers have begun using the Internet in recent years to conduct business online, they have been challenged to find digital forms of identification that mimic traditional, ... |  |  Mission Critical Internet SecurityThe best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This... |  |  Intrusion Detection and Correlation: Challenges and SolutionsIntrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and... |