Flylib.com
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Table of Contents
BackCover
Hardening Network Infrastructure
Foreword
Introduction
Part I: Do This Now
Chapter 1: Do These Six Things Before You Do Anything Else
Review Your Network Design
Implement a Firewall
Implement Access Control Lists
Turn Off Unnecessary Features and Services
Implement Virus Protection
Secure Your Wireless Connections
Summary
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Write a Security Policy
The Role of a Security Policy
Security Policy Components
Security Policy Recommendations
Why Security Policies Fail and How to Ensure Yours Won t
Summary
Chapter 3: Hardening Your Firewall
Hardware-Based and Software-Based Firewalls
Summary
Chapter 4: Hardening Your Network with Intrusion Detection and Prevention
IDSIPS Technologies
IDSIPS Components
IDSIPS Device Hardening
IDSIPS Deployments
IDSIPS Tuning
IDSIPS Logging, Alerting, and Blocking
Summary
Chapter 5: Hardening VPN and Dial-in Remote Access
Hardening VPN Connectivity
Hardening Dial-in Remote Access
Summary
Chapter 6: Hardening Your Routers and Switches
Hardening Management Access
Hardening Services and Features
Hardening Router Technologies
Hardening Switch Technologies
Summary
Chapter 7: Securing the Network with Content Filters
Internet Content Filtering Architectures
Internet Content Filtering
E-mail Content Filtering
Summary
Chapter 8: Hardening Wireless LAN Connections
Hardening Wireless Access Points
Hardening Wireless LAN Connections
Hardening Windows XP Wireless Clients
Summary
Chapter 9: Implementing AAA
AAA Mechanisms
Authentication and Access Control
Hardening Your Network with Authorization
Hardening Your Network with Accounting
802.1x Port-Based Authentication
Summary
Chapter 10: Hardening Your Network with Network Management
Implementing a Network Management System (NMS)
Hardening Your Network Management Protocols
Summary
Chapter 11: Implementing a Secure Perimeter
DMZ Implementation Methods
Internet Access Module
VPNRemote Access Module
WAN Access Module
Extranet Access Module
Wireless Access Module
E-Commerce Access Module
Summary
Chapter 12: Implementing a Secure Interior
Using Virtual LANs (VLANs) to Segment the Network
Designing the Enterprise Campus
Hardening BranchRemote Offices
Summary
Part III: Once Is Never Enough
Chapter 13: Auditing: Performing a Security Review
Reviewing Your Security Policy
Reviewing Your Security Posture
Auditing Your Environment
Summary
Chapter 14: Managing Changes to Your Environment
Implementing a Patch and Update Policy
Summary
Part IV: How to Succeed at Hardening Your Network Infrastructure
Chapter 15: Setting Perceptions and Justifying the Cost of Security
Setting Perceptions and Expectations
Justifying the Cost of Security
Summary
Chapter 16: Addressing Staffing and Training Issues
Training Issues
Summary
Chapter 17: Incident Response
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Z
List of Figures
List of Tables
List of Sidebars
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Summary
Applying the Seven Basic Quality Tools in Software Development
Pareto Diagram
The Rayleigh Model
Metrics and Lessons Learned for Object-Oriented Projects
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 15. Search for Keywords Without LIKE
Hack 23. Second Tuesday of the Month
Hack 59. Define Personalized Parameters
Hack 74. Compare and Synchronize Tables
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Individual change
Organizational change
Leading change
Part II - The Applications
Restructuring
Twisted Network Programming Essentials
Using the Twisted Documentation
Checking Whether a Page Has Changed
Managing a Hierarchy of Resources
Using the REST Architecture for Web Services
Authentication
Junos Cookbook (Cookbooks (OReilly))
Creating a Login Account for Remote Authentication
Using a Firewall Filter to Protect SNMP Access
Extracting Software Inventory Information with SNMP
Finding Out What IP Addresses Are Used on the Router
Filtering Traffic Transiting the Router
Extending and Embedding PHP
Data Storage
Automatic Type Conversion with zend_parse_parameters()
Vectors Versus Linked Lists
PHP5 Objects
Declaring and Accessing INI Settings
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies