Flylib.com
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Table of Contents
BackCover
Hardening Network Infrastructure
Foreword
Introduction
Part I: Do This Now
Chapter 1: Do These Six Things Before You Do Anything Else
Review Your Network Design
Implement a Firewall
Implement Access Control Lists
Turn Off Unnecessary Features and Services
Implement Virus Protection
Secure Your Wireless Connections
Summary
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Write a Security Policy
The Role of a Security Policy
Security Policy Components
Security Policy Recommendations
Why Security Policies Fail and How to Ensure Yours Won t
Summary
Chapter 3: Hardening Your Firewall
Hardware-Based and Software-Based Firewalls
Summary
Chapter 4: Hardening Your Network with Intrusion Detection and Prevention
IDSIPS Technologies
IDSIPS Components
IDSIPS Device Hardening
IDSIPS Deployments
IDSIPS Tuning
IDSIPS Logging, Alerting, and Blocking
Summary
Chapter 5: Hardening VPN and Dial-in Remote Access
Hardening VPN Connectivity
Hardening Dial-in Remote Access
Summary
Chapter 6: Hardening Your Routers and Switches
Hardening Management Access
Hardening Services and Features
Hardening Router Technologies
Hardening Switch Technologies
Summary
Chapter 7: Securing the Network with Content Filters
Internet Content Filtering Architectures
Internet Content Filtering
E-mail Content Filtering
Summary
Chapter 8: Hardening Wireless LAN Connections
Hardening Wireless Access Points
Hardening Wireless LAN Connections
Hardening Windows XP Wireless Clients
Summary
Chapter 9: Implementing AAA
AAA Mechanisms
Authentication and Access Control
Hardening Your Network with Authorization
Hardening Your Network with Accounting
802.1x Port-Based Authentication
Summary
Chapter 10: Hardening Your Network with Network Management
Implementing a Network Management System (NMS)
Hardening Your Network Management Protocols
Summary
Chapter 11: Implementing a Secure Perimeter
DMZ Implementation Methods
Internet Access Module
VPNRemote Access Module
WAN Access Module
Extranet Access Module
Wireless Access Module
E-Commerce Access Module
Summary
Chapter 12: Implementing a Secure Interior
Using Virtual LANs (VLANs) to Segment the Network
Designing the Enterprise Campus
Hardening BranchRemote Offices
Summary
Part III: Once Is Never Enough
Chapter 13: Auditing: Performing a Security Review
Reviewing Your Security Policy
Reviewing Your Security Posture
Auditing Your Environment
Summary
Chapter 14: Managing Changes to Your Environment
Implementing a Patch and Update Policy
Summary
Part IV: How to Succeed at Hardening Your Network Infrastructure
Chapter 15: Setting Perceptions and Justifying the Cost of Security
Setting Perceptions and Expectations
Justifying the Cost of Security
Summary
Chapter 16: Addressing Staffing and Training Issues
Training Issues
Summary
Chapter 17: Incident Response
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Z
List of Figures
List of Tables
List of Sidebars
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Project Management JumpStart
Developing Project Management Skills
Initiating the Project
Breaking Down the Project Activities
Developing the Project Plan
Appendix C Sample Project Management Checklists
VBScript Programmers Reference
Script Encoding
Adding VBScript to Your VB Applications
Appendix A VBScript Functions and Keywords
Appendix J VBA Features not in VBScript
Appendix L ActiveX Data Objects
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Two Principles
Chapter Seven Diagnose Before You Prescribe
Chapter Eight Creating Visions Biased to Your Solution
Chapter Twelve Controlling the Buying Process
Chapter Thirteen Closing: Reaching Final Agreement
Junos Cookbook (Cookbooks (OReilly))
Gathering Software Version Information
Tracking Router Configuration Changes
Improving IS-IS Convergence Times
Enabling OSPF Authentication
Limiting the Group Ranges an RP Services
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
The Value in Conquering Complexity
Phase 1 Readiness Assessment
Phase 4 Performance and Control
Designing World-Class Services (Design for Lean Six Sigma)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
The Evolution of Data Communications
LAN Characteristics
The Broadband Evolution
DSL Technology
Wireless Impairments
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies