Flylib.com
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Table of Contents
BackCover
Hardening Network Infrastructure
Foreword
Introduction
Part I: Do This Now
Chapter 1: Do These Six Things Before You Do Anything Else
Review Your Network Design
Implement a Firewall
Implement Access Control Lists
Turn Off Unnecessary Features and Services
Implement Virus Protection
Secure Your Wireless Connections
Summary
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Write a Security Policy
The Role of a Security Policy
Security Policy Components
Security Policy Recommendations
Why Security Policies Fail and How to Ensure Yours Won t
Summary
Chapter 3: Hardening Your Firewall
Hardware-Based and Software-Based Firewalls
Summary
Chapter 4: Hardening Your Network with Intrusion Detection and Prevention
IDSIPS Technologies
IDSIPS Components
IDSIPS Device Hardening
IDSIPS Deployments
IDSIPS Tuning
IDSIPS Logging, Alerting, and Blocking
Summary
Chapter 5: Hardening VPN and Dial-in Remote Access
Hardening VPN Connectivity
Hardening Dial-in Remote Access
Summary
Chapter 6: Hardening Your Routers and Switches
Hardening Management Access
Hardening Services and Features
Hardening Router Technologies
Hardening Switch Technologies
Summary
Chapter 7: Securing the Network with Content Filters
Internet Content Filtering Architectures
Internet Content Filtering
E-mail Content Filtering
Summary
Chapter 8: Hardening Wireless LAN Connections
Hardening Wireless Access Points
Hardening Wireless LAN Connections
Hardening Windows XP Wireless Clients
Summary
Chapter 9: Implementing AAA
AAA Mechanisms
Authentication and Access Control
Hardening Your Network with Authorization
Hardening Your Network with Accounting
802.1x Port-Based Authentication
Summary
Chapter 10: Hardening Your Network with Network Management
Implementing a Network Management System (NMS)
Hardening Your Network Management Protocols
Summary
Chapter 11: Implementing a Secure Perimeter
DMZ Implementation Methods
Internet Access Module
VPNRemote Access Module
WAN Access Module
Extranet Access Module
Wireless Access Module
E-Commerce Access Module
Summary
Chapter 12: Implementing a Secure Interior
Using Virtual LANs (VLANs) to Segment the Network
Designing the Enterprise Campus
Hardening BranchRemote Offices
Summary
Part III: Once Is Never Enough
Chapter 13: Auditing: Performing a Security Review
Reviewing Your Security Policy
Reviewing Your Security Posture
Auditing Your Environment
Summary
Chapter 14: Managing Changes to Your Environment
Implementing a Patch and Update Policy
Summary
Part IV: How to Succeed at Hardening Your Network Infrastructure
Chapter 15: Setting Perceptions and Justifying the Cost of Security
Setting Perceptions and Expectations
Justifying the Cost of Security
Summary
Chapter 16: Addressing Staffing and Training Issues
Training Issues
Summary
Chapter 17: Incident Response
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Z
List of Figures
List of Tables
List of Sidebars
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
SWT/JFace Mechanisms
Text Controls
Dialogs
Eclipse Forms
Snort Cookbook
Invisibly Tapping a Hub
Capturing Without Putting the Interface into Promiscuous Mode
Logging in PCAP Format (TCPDump)
Writing Your Own Preprocessor
Staying Legal
Building Web Applications with UML (2nd Edition)
Technical Risk
Summary
Artifacts of the UX Model
Discussion
Virtual and Physical HTTP Resources
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Language Selector
Working with Dates and Times
How to Attach a File to a Rich Text Object
Create a New Document by Double-Clicking on a Calendar Date
Migrating a Database Design
Cultural Imperative: Global Trends in the 21st Century
Americanization versus Asianization
Culture and Globalization
Conclusion
Epilogue After September 11
Appendix A Cultural Categorization Characteristics
Programming .Net Windows Applications
Windows Forms and the .NET Framework
Up-Down Controls
TreeView
Creating Custom Controls from Scratch
Bug Database: A Windows Application
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies