Flylib.com
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Table of Contents
BackCover
Hardening Network Infrastructure
Foreword
Introduction
Part I: Do This Now
Chapter 1: Do These Six Things Before You Do Anything Else
Review Your Network Design
Implement a Firewall
Implement Access Control Lists
Turn Off Unnecessary Features and Services
Implement Virus Protection
Secure Your Wireless Connections
Summary
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Write a Security Policy
The Role of a Security Policy
Security Policy Components
Security Policy Recommendations
Why Security Policies Fail and How to Ensure Yours Won t
Summary
Chapter 3: Hardening Your Firewall
Hardware-Based and Software-Based Firewalls
Summary
Chapter 4: Hardening Your Network with Intrusion Detection and Prevention
IDSIPS Technologies
IDSIPS Components
IDSIPS Device Hardening
IDSIPS Deployments
IDSIPS Tuning
IDSIPS Logging, Alerting, and Blocking
Summary
Chapter 5: Hardening VPN and Dial-in Remote Access
Hardening VPN Connectivity
Hardening Dial-in Remote Access
Summary
Chapter 6: Hardening Your Routers and Switches
Hardening Management Access
Hardening Services and Features
Hardening Router Technologies
Hardening Switch Technologies
Summary
Chapter 7: Securing the Network with Content Filters
Internet Content Filtering Architectures
Internet Content Filtering
E-mail Content Filtering
Summary
Chapter 8: Hardening Wireless LAN Connections
Hardening Wireless Access Points
Hardening Wireless LAN Connections
Hardening Windows XP Wireless Clients
Summary
Chapter 9: Implementing AAA
AAA Mechanisms
Authentication and Access Control
Hardening Your Network with Authorization
Hardening Your Network with Accounting
802.1x Port-Based Authentication
Summary
Chapter 10: Hardening Your Network with Network Management
Implementing a Network Management System (NMS)
Hardening Your Network Management Protocols
Summary
Chapter 11: Implementing a Secure Perimeter
DMZ Implementation Methods
Internet Access Module
VPNRemote Access Module
WAN Access Module
Extranet Access Module
Wireless Access Module
E-Commerce Access Module
Summary
Chapter 12: Implementing a Secure Interior
Using Virtual LANs (VLANs) to Segment the Network
Designing the Enterprise Campus
Hardening BranchRemote Offices
Summary
Part III: Once Is Never Enough
Chapter 13: Auditing: Performing a Security Review
Reviewing Your Security Policy
Reviewing Your Security Posture
Auditing Your Environment
Summary
Chapter 14: Managing Changes to Your Environment
Implementing a Patch and Update Policy
Summary
Part IV: How to Succeed at Hardening Your Network Infrastructure
Chapter 15: Setting Perceptions and Justifying the Cost of Security
Setting Perceptions and Expectations
Justifying the Cost of Security
Summary
Chapter 16: Addressing Staffing and Training Issues
Training Issues
Summary
Chapter 17: Incident Response
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Z
List of Figures
List of Tables
List of Sidebars
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
The Second Wave ERP Market: An Australian Viewpoint
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Distributed Data Warehouse for Geo-spatial Services
Data Mining for Business Process Reengineering
Healthcare Information: From Administrative to Practice Databases
Snort Cookbook
Invisibly Sniffing 100 MB Ethernet
Positioning Your IDS Sensors
Installing and Configuring Swatch
Recognizing HTTP Traffic on Unusual Ports
Creating a Reactive IDS
Managing Enterprise Systems with the Windows Script Host
File Operations
Registry Operations
Network Administration/WMI
Messaging Operations
System Administration
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 16. How Big Is the World?
Hack 21. Track the International Space Station
Hack 24. Search for Events by Location
Hack 43. Dont Believe Everything You Read on a Map
Hack 60. Make Things Happen When the Map Moves
InDesign Type: Professional Typography with Adobe InDesign CS2
Optical Kerning
Ligatures
Drop Cap Aesthetics
Up Next
Text Wrap Preferences
VBScript in a Nutshell, 2nd Edition
VBScript Data Types: The Many Faces of the Variant
Running Your Code
Windows Script Host 5.6
Appendix B. VBScript Constants
Section E.1. How Encoding and Decoding Works
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies