List of Tables

Chapter 1: Internet Infrastructure for Security Professionals

Table 1-1: Risks and Benefits of Outsourcing Internet Services to an ISP
Table 1-2: Risks and Benefits of Self-Managing Internet Services

Chapter 2: ISP Security PracticesSeparating Fact from Fiction

Table 2-1: ISP Security Assumptions vs. Reality

Chapter 4: Reliable Connectivity

Table 4-1: Network Components and Conditions Leading to Unreliable Connectivity
Table 4-2: Potentially Dangerous "Default" Services on Routers/Switches
Table 4-3: Open Source Configuration Management and Network Management Tools

Chapter 6: Redefining the DMZSecuring Critical Systems

Table 6-1: Potential Weaknesses in DMZ Design and Methods of Exploitation
Table 6-2: Checklist for Developing Defenses in a Traditional DMZ Security Zone
Table 6-3: Risks and Benefits of a Traditional DMZ Design
Table 6-4: Risks and Benefits of a Modern DMZ Design

Chapter 11: Securing Wireless Networks

Table 11-1: 802.11 — Standards Information
Table 11-2: Pros and Cons of Bluetooth

Chapter 13: A Winning Methodology for Vulnerability Assessments

Table 13-1: Vulnerability Assessment Methodology Standards

Chapter 15: Performing the Assessment, Part II

Table 15-1: ICMP Type Listing
Table 15-2: Examples of Input Information for Conducting Data Model Calculations
Table 15-3: Examples of Output Information for Conducting Data Model Calculations


Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net