Der Artikel ist weiterhin als ^^OTHERCONDITION^^ verfügbar.
Autor: Allan Liska
ISBN-13: 9780130462237
Einband: Taschenbuch
Seiten: 416
Gewicht: 694 g
Format: 242x177x23 mm
Sprache: Englisch
Erscheinungsdatum: 01.01.2003

The Practice of Network Security: Deployment Strategies for Production Environments

Prentice Hall Series in Comput
 Taschenbuch
Besorgungstitel  |
 Lieferzeit: 3-5 Tage  
Unser bisheriger Preis: 56,66 €
Jetzt 49,08 €

Alle Preise inkl. MwSt.
| zzgl. Versand
4
1. Defining the Scope. What is Network Security? What Types of Network Security Are Important? What Is the Cost of Lax Security Policies? Where Is the Network Vulnerable? The Network. Summary. 2. Security Mode. Choosing a Security Mode. OCTAVE. Build Asset-Based Threat Profiles. Identify Infrastructure Vulnerabilities. Evaluate Security Strategy and Plans. Summary. 3. Understanding Types of Attacks. Sniffing and Port Scanning. Exploits. Spoofing. Distributed Denial of Service Attacks. Viruses and Worms. Summary. 4. Routing. The Router on the Network. The Basics. Disabling Unused Services. Redundancy. Securing Routing Protocols. Limit Access to Routers. Change Default Passwords! Summary. 5. Switching. The Switch on the Network. Multilayer Switching. VLANs. Spanning Tree. MAC Addressing. Restricting Access to Switches. Summary. 6. Authentication, Authorization, and Accounting. Kerberos. RADIUS. TACACS+. Summary. 7. Remote Access and VPNs. VPN Solutions. IP VPN Security. Dial-In Security Access. DSL and Cable VPN Security. Encrypting Remote Sessions. The VPN on the Network. Summary. 8. Wireless Wide Area Networks. Wireless WAN Security Issues. Spread Spectrum Technology. Location. Summary. 9. Wireless Local Area Networks. Access Point Security. SSID. WEP. MAC Address Filtering.RADIUS Authentication. WLAN VPN. 802.11i92. Summary. 10. Firewalls and Intrusion Detection Systems. The Purpose of the Firewall. What a Firewall Cannot Do. Types of Firewalls. Layer 2 Firewalls. Intrusion Detection Systems. Summary. 11. The DMZ. DMZ Network Design. Multiple DMZ Design. DMZ Rulesets. Summary. 12. Server Security. General Server Security Guidelines. Backups. Web Server Security. Mail Server Security. Outsourcing. Summary. 13. DNS Security. Securing Your Domain Name. A Secure BIND Installation. Limit Access to Domain Information. DNS Outsourcing. Djbdns. Summary. 14. Workstation Security. General Workstation Security Guidelines. Virus and Worm Scanning. Administrative Access. Remote Login. Summary. 15. Managing Network Security. Enforcing Security Policies. Understanding Network Security Risks. Avoiding Common Mistakes. Summary. 16. Monitoring. What to Monitor. SNMP. Centralizing the Monitoring Process. Summary. 17. Logging. Protecting Against Log-Altering Attacks. Syslog Servers. Sifting Through Logged Data. Summary. 18. Responding to an Attack. Creating a Response Chain of Command. Take Notes and Gather Evidence. Contain and Investigate the Problem. Remove the Problem. Contact Appropriate Parties. Prepare a Postmortem. Summary.
3
Appropriate for all courses in network or information security.
This book teaches students how to secure any network, large or small. More than other books, it reflects the realities network administrators actually face on the front lines, where they are constantly under attack, and don't always get the support they need from their organizations. Former UUNet network architect Allan Liska addresses every facet of network security, including defining security models, access control, Web/DNS/email security, remote access and VPNs, wireless LAN/WAN security, day-to-day monitoring and logging, attack response, and more. He systematically identifies today's most widespread security mistakes and vulnerabilities, offering realistic and up-to-date solutions. He then integrates these techniques in an end-to-end case study, showing how to redesign an insecure enterprise network for maximum security, one step at a time.
Autor: Allan Liska
ALLAN LISKA is a Security Engineer with Symantec's Enterprise Security Services division. Prior to that Mr. Liska spent six years at WorldCom, where he served as a network architect for WorldCom's hosting division. He is also a CISSP who has written about network management, administration, and Web-server security.

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

 

Rezensionen

Autor: Allan Liska
ISBN-13:: 9780130462237
ISBN: 0130462233
Erscheinungsjahr: 01.01.2003
Verlag: PRENTICE HALL COMPUTER
Gewicht: 694g
Seiten: 416
Sprache: Englisch
Sonstiges: Taschenbuch, 242x177x23 mm