Flylib.com
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Table of Contents
BackCover
Hardening Network Infrastructure
Foreword
Introduction
Part I: Do This Now
Chapter 1: Do These Six Things Before You Do Anything Else
Review Your Network Design
Implement a Firewall
Implement Access Control Lists
Turn Off Unnecessary Features and Services
Implement Virus Protection
Secure Your Wireless Connections
Summary
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Write a Security Policy
The Role of a Security Policy
Security Policy Components
Security Policy Recommendations
Why Security Policies Fail and How to Ensure Yours Won t
Summary
Chapter 3: Hardening Your Firewall
Hardware-Based and Software-Based Firewalls
Summary
Chapter 4: Hardening Your Network with Intrusion Detection and Prevention
IDSIPS Technologies
IDSIPS Components
IDSIPS Device Hardening
IDSIPS Deployments
IDSIPS Tuning
IDSIPS Logging, Alerting, and Blocking
Summary
Chapter 5: Hardening VPN and Dial-in Remote Access
Hardening VPN Connectivity
Hardening Dial-in Remote Access
Summary
Chapter 6: Hardening Your Routers and Switches
Hardening Management Access
Hardening Services and Features
Hardening Router Technologies
Hardening Switch Technologies
Summary
Chapter 7: Securing the Network with Content Filters
Internet Content Filtering Architectures
Internet Content Filtering
E-mail Content Filtering
Summary
Chapter 8: Hardening Wireless LAN Connections
Hardening Wireless Access Points
Hardening Wireless LAN Connections
Hardening Windows XP Wireless Clients
Summary
Chapter 9: Implementing AAA
AAA Mechanisms
Authentication and Access Control
Hardening Your Network with Authorization
Hardening Your Network with Accounting
802.1x Port-Based Authentication
Summary
Chapter 10: Hardening Your Network with Network Management
Implementing a Network Management System (NMS)
Hardening Your Network Management Protocols
Summary
Chapter 11: Implementing a Secure Perimeter
DMZ Implementation Methods
Internet Access Module
VPNRemote Access Module
WAN Access Module
Extranet Access Module
Wireless Access Module
E-Commerce Access Module
Summary
Chapter 12: Implementing a Secure Interior
Using Virtual LANs (VLANs) to Segment the Network
Designing the Enterprise Campus
Hardening BranchRemote Offices
Summary
Part III: Once Is Never Enough
Chapter 13: Auditing: Performing a Security Review
Reviewing Your Security Policy
Reviewing Your Security Posture
Auditing Your Environment
Summary
Chapter 14: Managing Changes to Your Environment
Implementing a Patch and Update Policy
Summary
Part IV: How to Succeed at Hardening Your Network Infrastructure
Chapter 15: Setting Perceptions and Justifying the Cost of Security
Setting Perceptions and Expectations
Justifying the Cost of Security
Summary
Chapter 16: Addressing Staffing and Training Issues
Training Issues
Summary
Chapter 17: Incident Response
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Z
List of Figures
List of Tables
List of Sidebars
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Postfix: The Definitive Guide
Outbound Mail Relay
Spam Detection
Command-Based Filtering
C.5. Compiling Add-on Packages
Appendix D. Frequently Asked Questions
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Two Principles
Chapter Six Defining Pain or Critical Business Issue
Chapter Twelve Controlling the Buying Process
Appendix A Value Justification Example
Programming Microsoft ASP.NET 3.5
Creating Bindable Grids of Data
Paging Through Data Sources
The HTTP Request Context
HTTP Handlers and Modules
Index
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Credibility and Computers
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Java Concurrency in Practice
Synchronized Collections
Summary
Shared Data Models
Example: Comparing Map Performance
Testing for Correctness
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
The Hello, World Quartz Project
Uses of the Quartz Listeners
Creating a Quartz RMI Server
What Does Clustering Mean to Quartz?
Quick Introduction to OSWorkflow
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies