Warenkorb
€ 0,00 0 Buch dabei,
portofrei
The Practice of Network Security: Deployment Strategies for Production Environments als Buch
PORTO-
FREI

The Practice of Network Security: Deployment Strategies for Production Environments

Sprache: Englisch.
Buch (kartoniert)
Ihr 12%-Rabatt auf alle Spielwaren, Hörbücher, Filme, Musik u.v.m
 
12% Rabatt sichern mit Gutscheincode: WIESN12
 
Appropriate for all courses in network or information security.
This book teaches students how to secure any network, large or small. More than other books, it reflects the realities network administrators actually face on the front lines, where they … weiterlesen
Buch

45,99*

inkl. MwSt.
Portofrei
vorbestellbar
The Practice of Network Security: Deployment Strategies for Production Environments als Buch

Produktdetails

Titel: The Practice of Network Security: Deployment Strategies for Production Environments
Autor/en: Allan Liska

ISBN: 0130462233
EAN: 9780130462237
Sprache: Englisch.
PRENTICE HALL COMPUTER

Januar 2003 - kartoniert - 416 Seiten

Beschreibung

Appropriate for all courses in network or information security.
This book teaches students how to secure any network, large or small. More than other books, it reflects the realities network administrators actually face on the front lines, where they are constantly under attack, and don't always get the support they need from their organizations. Former UUNet network architect Allan Liska addresses every facet of network security, including defining security models, access control, Web/DNS/email security, remote access and VPNs, wireless LAN/WAN security, day-to-day monitoring and logging, attack response, and more. He systematically identifies today's most widespread security mistakes and vulnerabilities, offering realistic and up-to-date solutions. He then integrates these techniques in an end-to-end case study, showing how to redesign an insecure enterprise network for maximum security, one step at a time.

Inhaltsverzeichnis

1. Defining the Scope. What is Network Security? What Types of Network Security Are Important? What Is the Cost of Lax Security Policies? Where Is the Network Vulnerable? The Network. Summary. 2. Security Mode. Choosing a Security Mode. OCTAVE. Build Asset-Based Threat Profiles. Identify Infrastructure Vulnerabilities. Evaluate Security Strategy and Plans. Summary. 3. Understanding Types of Attacks. Sniffing and Port Scanning. Exploits. Spoofing. Distributed Denial of Service Attacks. Viruses and Worms. Summary. 4. Routing. The Router on the Network. The Basics. Disabling Unused Services. Redundancy. Securing Routing Protocols. Limit Access to Routers. Change Default Passwords! Summary. 5. Switching. The Switch on the Network. Multilayer Switching. VLANs. Spanning Tree. MAC Addressing. Restricting Access to Switches. Summary. 6. Authentication, Authorization, and Accounting. Kerberos. RADIUS. TACACS+. Summary. 7. Remote Access and VPNs. VPN Solutions. IP VPN Security. Dial-In Security Access. DSL and Cable VPN Security. Encrypting Remote Sessions. The VPN on the Network. Summary. 8. Wireless Wide Area Networks. Wireless WAN Security Issues. Spread Spectrum Technology. Location. Summary. 9. Wireless Local Area Networks. Access Point Security. SSID. WEP. MAC Address Filtering.RADIUS Authentication. WLAN VPN. 802.11i92. Summary. 10. Firewalls and Intrusion Detection Systems. The Purpose of the Firewall. What a Firewall Cannot Do. Types of Firewalls. Layer 2 Firewalls. Intrusion Detection Systems. Summary. 11. The DMZ. DMZ Network Design. Multiple DMZ Design. DMZ Rulesets. Summary. 12. Server Security. General Server Security Guidelines. Backups. Web Server Security. Mail Server Security. Outsourcing. Summary. 13. DNS Security. Securing Your Domain Name. A Secure BIND Installation. Limit Access to Domain Information. DNS Outsourcing. Djbdns. Summary. 14. Workstation Security. General Workstation Security Guidelines. Virus and Worm Scanning. Administrative Access. Remote Login. Summary. 15. Managing Network Security. Enforcing Security Policies. Understanding Network Security Risks. Avoiding Common Mistakes. Summary. 16. Monitoring. What to Monitor. SNMP. Centralizing the Monitoring Process. Summary. 17. Logging. Protecting Against Log-Altering Attacks. Syslog Servers. Sifting Through Logged Data. Summary. 18. Responding to an Attack. Creating a Response Chain of Command. Take Notes and Gather Evidence. Contain and Investigate the Problem. Remove the Problem. Contact Appropriate Parties. Prepare a Postmortem. Summary.

Portrait

ALLAN LISKA is a Security Engineer with Symantec's Enterprise Security Services division. Prior to that Mr. Liska spent six years at WorldCom, where he served as a network architect for WorldCom's hosting division. He is also a CISSP who has written about network management, administration, and Web-server security.

Mehr aus dieser Reihe

zurück
Tomsu: Nxt Genratn Optical Netwks_c1
Buch (kartoniert)
von Peter Tomsu, Chr…
Malware: Fighting Malicious Code
Buch (kartoniert)
von Ed Skoudis, Lenn…
Introduction Functional Programming
Buch (kartoniert)
von Richard Bird
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing: Server, Firewall, and Cache Load Balancing
Buch (kartoniert)
von Matthew Syme, Ph…
WebDav: Next-Generation Collaborative Web Authoring
Buch (kartoniert)
von Lisa Dusseault
vor
Servicehotline
089 - 70 80 99 47

Mo. - Fr. 8.00 - 20.00 Uhr
Sa. 10.00 - 20.00 Uhr
Filialhotline
089 - 30 75 75 75

Mo. - Sa. 9.00 - 20.00 Uhr
Bleiben Sie in Kontakt:
Sicher & bequem bezahlen:
akzeptierte Zahlungsarten: Überweisung, offene Rechnung,
Visa, Master Card, American Express, Paypal
Zustellung durch:
* Alle Preise verstehen sich inkl. der gesetzlichen MwSt. Informationen über den Versand und anfallende Versandkosten finden Sie hier.
** Deutschsprachige eBooks und Bücher dürfen aufgrund der in Deutschland geltenden Buchpreisbindung und/oder Vorgaben von Verlagen nicht rabattiert werden. Soweit von uns deutschsprachige eBooks und Bücher günstiger angezeigt werden, wurde bei diesen kürzlich von den Verlagen der Preis gesenkt oder die Buchpreisbindung wurde für diese Titel inzwischen aufgehoben. Angaben zu Preisnachlässen beziehen sich auf den dargestellten Vergleichspreis.