Flylib.com
Network Perimeter Security: Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Cliff Riggs
BUY ON AMAZON
Table of Contents
BackCover
Network Perimeter Security - Building Defense In-Depth
Chapter 1: Introduction
1.2 The Path to Network Security
1.3 Who Should Read This Book?
Chapter 2: Managing Network Security
2.1 The Big Picture: Security Policies from A to Z
2.2 Administrative Countermeasures
2.3 Physical Countermeasures
2.4 Technological Countermeasures
2.5 Creating the Security Standards Document
2.6 Creating the Configuration Guide Document
2.7 Pulling It All Together: Sample Security Policy Creation
2.8 Proteris Security Standards and Procedures
Notes
Chapter 3: The Network Stack and Security
3.1 Connecting the Network
3.2 Protocols
3.3 Servers and Hosts
Notes
Chapter 4: Cryptography and VPN Terminology
4.1 Keys
4.2 Certificates
4.3 Hashing
4.4 Digital Signatures
4.5 Common Encryption Algorithms
4.6 Split Tunneling
Notes
Chapter 5: Application Security Needs
5.1 The Network Time Protocol
5.2 Domain Name System Servers
Chapter 6: Access Control
6.1 Passwords
6.2 Biometrics
6.3 RADIUSTACACS
Note
Chapter 7: The Public Key Infrastructure
7.1 PKI Protocols
7.2 PKI Implementation
Notes
Chapter 8: Firewalls
8.2 Decisions, Decisions
8.3 Router Security Considerations
8.4 The Router as the Firewall
8.5 Improving Your Security beyond Basic Packet Filtering
8.6 Application Layer Filtering
8.7 Specific Protocol Considerations
8.8 Additional Router Firewall Features
8.9 Writing and Applying Filters
8.10 Maintaining Firewalls
8.11 NAT, Firewalls, VPNs, and the DMZ
Notes
Chapter 9: Intrusion Detection Systems
9.1 Signature-Based IDS
9.2 Statistical-Based IDS
9.3 Host-Based versus Network-Based IDSs
9.4 Tuning the IDS
9.5 IDS Placement
9.6 Reactive IDS
9.7 Integrating the Firewall and IDS
9.8 Other IDSs
Note
Chapter 10: Virtual Private Networks
10.1 VPN Limitations
10.2 VPN Solutions
10.3 IP-Based Virtual Private Networks
10.4 Internet Protocol Security (IPSec)
10.5 Key Exchanges
10.6 Internet Key Exchange (IKE)
10.7 Integrating Network Address Translation (NAT) and IPSec
10.8 Integrating the VPN and Firewall
10.9 Quality of Service (QoS) and the VPN
Notes
Chapter 11: Wireless Network Security
Chapter 12: Network Penetration Testing
12.1 Outsourcing Network Penetration Testing
12.2 Putting It All Together
Note
Chapter 13: Incident Response
13.1 Prevention
13.2 Detection
13.3 Evaluation
13.4 Containment
13.5 Investigation
13.6 Eradication
13.7 Post-Mortem
Notes
Chapter 14: Disaster Recovery and Continuity Planning
14.1 Types of Disaster Recovery Plans
Chapter 15: Acceptable Use Policies
Chapter 16: The Final Word
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Exhibits
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors:
Cliff Riggs
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Process Resource Limits
Semaphore Operations
Key Terms and Concepts
Sockets: The Connectionless Paradigm
Key Terms and Concepts
Absolute Beginner[ap]s Guide to Project Management
Summary of Supplemental Project Plan Components
Developing the Work Breakdown Structure
Management Fundamentals for Project Control
Variance Responses
Power of Servant Leadership Approach
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
Rethinking Efficient Replenishment in the Grocery Sector
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Information Dashboard Design: The Effective Visual Communication of Data
Typical Dashboard Data
Exceeding the Boundaries of a Single Screen
Choosing a Deficient Measure
Arranging the Data Poorly
Highlighting Important Data Ineffectively or Not at All
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
Sap Bw: a Step By Step Guide for Bw 2.0
Checking Data Quality
Summary
Other InfoCube Design Techniques
Creating an R/3 Source System
Appendix C. Glossary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies