| | ||||||||||
| Hardening Network Infrastructure: Bulletproof Your Systems Before You Are Hacked! | |
| by Wesley J. Noonan | ISBN:0072255021 |
| McGraw-Hill/Osborne © 2004 (552 pages) | |
| This thorough, hard-hitting guide will help you make the vital upgrades and take the fundamental steps to secure your network infrastructure from hackers. | |
| Table of Contents | |||
| | Hardening Network Infrastructure | ||
| | Foreword | ||
| | Introduction | ||
| Part I - Do This Now! | |||
| | Chapter 1 | - | Do These Six Things Before You Do Anything Else |
| Part II - Take It From The Top: The Systematic Hardening Process | |||
| | Chapter 2 | - | Write a Security Policy |
| | Chapter 3 | - | Hardening Your Firewall |
| | Chapter 4 | - | Hardening Your Network with Intrusion Detection and Prevention |
| | Chapter 5 | - | Hardening VPN and Dial-in Remote Access |
| | Chapter 6 | - | Hardening Your Routers and Switches |
| | Chapter 7 | - | Securing the Network with Content Filters |
| | Chapter 8 | - | Hardening Wireless LAN Connections |
| | Chapter 9 | - | Implementing AAA |
| | Chapter 10 | - | Hardening Your Network with Network Management |
| | Chapter 11 | - | Implementing a Secure Perimeter |
| | Chapter 12 | - | Implementing a Secure Interior |
| Part III - Once Is Never Enough! | |||
| | Chapter 13 | - | Auditing: Performing a Security Review |
| | Chapter 14 | - | Managing Changes to Your Environment |
| Part IV - How to Succeed at Hardening Your Network Infrastructure | |||
| | Chapter 15 | - | Setting Perceptions and Justifying the Cost of Security |
| | Chapter 16 | - | Addressing Staffing and Training Issues |
| | Chapter 17 | - | Incident Response |
| | Index | ||
| | List of Figures | ||
| | List of Tables | ||
| | List of Sidebars | ||