Flylib.com
The Practice of Network Security: Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
The Practice of Network Security: Deployment Strategies for Production Environments
Table of Contents
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Acknowledgements
Introduction
Purpose of This Book
The Complaint Department
Chapter 1. Defining the Scope
1.1 What is Network Security?
1.2 What Types of Network Security Are Important?
1.3 What Is the Cost of Lax Security Policies?
1.4 Where Is the Network Vulnerable?
1.5 The Network
1.6 Summary
Chapter 2. Security Model
2.1 Choosing a Security Model
2.2 OCTAVE
2.3 Build Asset-Based Threat Profiles
2.4 Identify Infrastructure Vulnerabilities
2.5 Evaluate Security Strategy and Plans
2.6 Summary
Chapter 3. Understanding Types of Attacks
3.1 Sniffing and Port Scanning
3.2 Exploits
3.3 Spoofing
3.4 Distributed Denial of Service Attacks
3.5 Viruses and Worms
3.6 Summary
Chapter 4. Routing
4.1 The Router on the Network
4.2 The Basics
4.3 Disabling Unused Services
4.4 Redundancy
4.5 Securing Routing Protocols
4.6 Limit Access to Routers
4.7 Change Default Passwords
4.8 Summary
Chapter 5. Switching
5.1 The Switch on the Network
5.2 Multilayer Switching
5.3 VLANs
5.4 Spanning Tree
5.5 MAC Addressing
5.6 ARP Tables
5.7 Restricting Access to Switches
5.8 Summary
Chapter 6. Authentication, Authorization, and Accounting
6.1 Kerberos
6.2 RADIUS
6.3 TACACS
6.4 Summary
Chapter 7. Remote Access and VPNs
7.1 VPN Solutions
7.2 IP VPN Security
7.3 Dial-In Security Access
7.4 DSL and Cable VPN Security
7.5 Encrypting Remote Sessions
7.6 The VPN on the Network
7.7 Summary
Chapter 8. Wireless Wide Area Networks
8.1 Wireless WAN Security Issues
8.2 Spread Spectrum Technology
8.3 Location
8.4 Summary
Chapter 9. Wireless Local Area Networks
9.1 Access Point Security
9.2 SSID
9.3 WEP
9.4 MAC Address Filtering
9.5 RADIUS Authentication
9.6 WLAN VPN
9.7 802.11i
9.8 Summary
Chapter 10. Firewalls and Intrusion Detection Systems
10.1 The Purpose of the Firewall
10.2 What a Firewall Cannot Do
10.3 Types of Firewalls
10.4 Layer 2 Firewalls
10.5 Intrusion Detection Systems
10.6 Summary
Chapter 11. The DMZ
11.1 DMZ Network Design
11.2 Multiple DMZ Design
11.3 DMZ Rule Sets
11.4 Summary
Chapter 12. Server Security
12.1 General Server Security Guidelines
12.2 Backups
12.3 Web Server Security
12.4 Mail Server Security
12.5 Outsourcing
12.6 Summary
Chapter 13. DNS Security
13.1 Securing Your Domain Name
13.2 A Secure BIND Installation
13.3 Limit Access to Domain Information
13.4 DNS Outsourcing
13.5 djbdns
13.6 Summary
Chapter 14. Workstation Security
14.1 General Workstation Security Guidelines
14.2 Virus and Worm Scanning
14.3 Administrative Access
14.4 Remote Login
14.5 Summary
Chapter 15. Managing Network Security
15.1 Enforcing Security Policies
15.2 Understanding Network Security Risks
15.3 Avoiding Common Mistakes
15.4 Summary
Chapter 16. Monitoring
16.1 What to Monitor
16.2 SNMP
16.3 Centralizing the Monitoring Process
16.4 Summary
Chapter 17. Logging
17.1 Protecting Against Log-Altering Attacks
17.2 Syslog Servers
17.3 Sifting Through Logged Data
17.4 Summary
Chapter 18. Responding to an Attack
18.1 Create a Response Chain of Command
18.2 Take Notes and Gather Evidence
18.3 Contain and Investigate the Problem
18.4 Remove the Problem
18.5 Contact Appropriate Parties
18.6 Prepare a Postmortem
18.7 Summary
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors:
Allan Liska
BUY ON AMAZON
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Forming Your Kanban Team
Size the Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
The Complete Cisco VPN Configuration Guide
Packet Authentication
ISAKMP/IKE Phase 1
Microsoft Client Connections
Router Site-to-Site Connections
Troubleshooting Router Connections
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Building Windows Forms User Interfaces
Visual Studio .NET
Securing Applications
Coding Conventions
Java Concurrency in Practice
What is Thread Safety?
Short-running GUI Tasks
Long-running GUI Tasks
Summary
Avoiding Performance Testing Pitfalls
Special Edition Using FileMaker 8
Whats a Layout?
FileMaker Extra: Complex Many-to-Many Relationships
Troubleshooting
Navigation
Troubleshooting
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
What about Alternative Solutions?
Brief Overview of Java RMI
Using Other J2EE Resources
Configuring Quartz to Use Clustering
Using a ServletContextListener
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies