Flylib.com
The Practice of Network Security: Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
The Practice of Network Security: Deployment Strategies for Production Environments
Table of Contents
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Acknowledgements
Introduction
Purpose of This Book
The Complaint Department
Chapter 1. Defining the Scope
1.1 What is Network Security?
1.2 What Types of Network Security Are Important?
1.3 What Is the Cost of Lax Security Policies?
1.4 Where Is the Network Vulnerable?
1.5 The Network
1.6 Summary
Chapter 2. Security Model
2.1 Choosing a Security Model
2.2 OCTAVE
2.3 Build Asset-Based Threat Profiles
2.4 Identify Infrastructure Vulnerabilities
2.5 Evaluate Security Strategy and Plans
2.6 Summary
Chapter 3. Understanding Types of Attacks
3.1 Sniffing and Port Scanning
3.2 Exploits
3.3 Spoofing
3.4 Distributed Denial of Service Attacks
3.5 Viruses and Worms
3.6 Summary
Chapter 4. Routing
4.1 The Router on the Network
4.2 The Basics
4.3 Disabling Unused Services
4.4 Redundancy
4.5 Securing Routing Protocols
4.6 Limit Access to Routers
4.7 Change Default Passwords
4.8 Summary
Chapter 5. Switching
5.1 The Switch on the Network
5.2 Multilayer Switching
5.3 VLANs
5.4 Spanning Tree
5.5 MAC Addressing
5.6 ARP Tables
5.7 Restricting Access to Switches
5.8 Summary
Chapter 6. Authentication, Authorization, and Accounting
6.1 Kerberos
6.2 RADIUS
6.3 TACACS
6.4 Summary
Chapter 7. Remote Access and VPNs
7.1 VPN Solutions
7.2 IP VPN Security
7.3 Dial-In Security Access
7.4 DSL and Cable VPN Security
7.5 Encrypting Remote Sessions
7.6 The VPN on the Network
7.7 Summary
Chapter 8. Wireless Wide Area Networks
8.1 Wireless WAN Security Issues
8.2 Spread Spectrum Technology
8.3 Location
8.4 Summary
Chapter 9. Wireless Local Area Networks
9.1 Access Point Security
9.2 SSID
9.3 WEP
9.4 MAC Address Filtering
9.5 RADIUS Authentication
9.6 WLAN VPN
9.7 802.11i
9.8 Summary
Chapter 10. Firewalls and Intrusion Detection Systems
10.1 The Purpose of the Firewall
10.2 What a Firewall Cannot Do
10.3 Types of Firewalls
10.4 Layer 2 Firewalls
10.5 Intrusion Detection Systems
10.6 Summary
Chapter 11. The DMZ
11.1 DMZ Network Design
11.2 Multiple DMZ Design
11.3 DMZ Rule Sets
11.4 Summary
Chapter 12. Server Security
12.1 General Server Security Guidelines
12.2 Backups
12.3 Web Server Security
12.4 Mail Server Security
12.5 Outsourcing
12.6 Summary
Chapter 13. DNS Security
13.1 Securing Your Domain Name
13.2 A Secure BIND Installation
13.3 Limit Access to Domain Information
13.4 DNS Outsourcing
13.5 djbdns
13.6 Summary
Chapter 14. Workstation Security
14.1 General Workstation Security Guidelines
14.2 Virus and Worm Scanning
14.3 Administrative Access
14.4 Remote Login
14.5 Summary
Chapter 15. Managing Network Security
15.1 Enforcing Security Policies
15.2 Understanding Network Security Risks
15.3 Avoiding Common Mistakes
15.4 Summary
Chapter 16. Monitoring
16.1 What to Monitor
16.2 SNMP
16.3 Centralizing the Monitoring Process
16.4 Summary
Chapter 17. Logging
17.1 Protecting Against Log-Altering Attacks
17.2 Syslog Servers
17.3 Sifting Through Logged Data
17.4 Summary
Chapter 18. Responding to an Attack
18.1 Create a Response Chain of Command
18.2 Take Notes and Gather Evidence
18.3 Contain and Investigate the Problem
18.4 Remove the Problem
18.5 Contact Appropriate Parties
18.6 Prepare a Postmortem
18.7 Summary
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Charge-Coupled Devices
Video Standards
Camera Interfaces and Protocols
Pixel Value Analysis
Pattern Matching
Java How to Program (6th Edition) (How to Program (Deitel))
Exercises
Wrap-Up
Overloading Generic Methods
First JSP Example
Directives
Cisco CallManager Fundamentals (2nd Edition)
Media Processing
Summary
Monitoring Tools
Infrastructure Solutions
Application Solutions
An Introduction to Design Patterns in C++ with Qt 4
Input and Output
Streams and Dates
Points of Departure
Review Questions
Models and Views: PlayList
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hacks 5262: Introduction
Hack 61. Unwire Your Pistol Mouse
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
Hack 87. Primestar Dish with Waveguide Feed
Hack 100. Take Advantage of Antenna Polarization
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
Rotoscoping Techniques with Photoshop
Matte and Keying Plug-ins
Atmosphere, Film, and Noise Effects
Custom Scene Transitions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies