Hardening Network Infrastructure: Bulletproof Your Systems Before You Are Hacked! | |
by Wesley J. Noonan | ISBN:0072255021 |
McGraw-Hill/Osborne © 2004 (552 pages) | |
This thorough, hard-hitting guide will help you make the vital upgrades and take the fundamental steps to secure your network infrastructure from hackers. | |
Table of Contents | |||
Hardening Network Infrastructure | |||
Foreword | |||
Introduction | |||
Part I - Do This Now! | |||
Chapter 1 | - | Do These Six Things Before You Do Anything Else | |
Part II - Take It From The Top: The Systematic Hardening Process | |||
Chapter 2 | - | Write a Security Policy | |
Chapter 3 | - | Hardening Your Firewall | |
Chapter 4 | - | Hardening Your Network with Intrusion Detection and Prevention | |
Chapter 5 | - | Hardening VPN and Dial-in Remote Access | |
Chapter 6 | - | Hardening Your Routers and Switches | |
Chapter 7 | - | Securing the Network with Content Filters | |
Chapter 8 | - | Hardening Wireless LAN Connections | |
Chapter 9 | - | Implementing AAA | |
Chapter 10 | - | Hardening Your Network with Network Management | |
Chapter 11 | - | Implementing a Secure Perimeter | |
Chapter 12 | - | Implementing a Secure Interior | |
Part III - Once Is Never Enough! | |||
Chapter 13 | - | Auditing: Performing a Security Review | |
Chapter 14 | - | Managing Changes to Your Environment | |
Part IV - How to Succeed at Hardening Your Network Infrastructure | |||
Chapter 15 | - | Setting Perceptions and Justifying the Cost of Security | |
Chapter 16 | - | Addressing Staffing and Training Issues | |
Chapter 17 | - | Incident Response | |
Index | |||
List of Figures | |||
List of Tables | |||
List of Sidebars |