The Practice of Network Security: Deployment Strategies for Production EnvironmentsPrentice Hall Professional, 2003 - 391 páginas Covering the best practices in major security tasks including developing a security model, monitoring for and logging security breaches, and responding to an attack, this title discusses both malicious and unintentional attack, and how to develop a defense strategy. Includes a running example of a network designed for a 500+ person company and how the network is secured at various levels. |
Conteúdo
Chapter | 1 |
Chapter | 8 |
Chapter | 15 |
Chapter 1 | 1 |
Chapter 2 | 23 |
Chapter 3 | 41 |
Chapter 4 | 59 |
Chapter 5 | 97 |
Chapter 10 | 197 |
The DMZ | 217 |
Chapter 12 | 231 |
Chapter 13 | 272 |
Chapter 14 | 299 |
Managing Network Security | 313 |
Monitoring | 327 |
Chapter 17 | 349 |
Chapter 6 | 121 |
Remote Access and VPNs | 135 |
Wireless Wide Area Networks | 167 |
Wireless Local Area Networks | 179 |
Responding to an Attack | 369 |
383 | |
Termos e frases comuns
access point allow areas assets authentication backup chapter Cisco Common Criteria configured connection cost create database DDoS attacks default developed dial-up disabled djbdns DNS server e-mail employees encryption evaluation exploit Figure firewall gain access implemented important infected Checking infrastructure installed interface Internet IP address L2TP Layer login MAC address machine mail server monitoring Multilayer switches multiple name server netblock network administrators network device network security network security policy OCTAVE operating system organization OSPF packet password Port Scanning private network problem protocol public servers RADIUS server remote request risk rity root rootkit router routing script kiddie secu security holes security model security policy senior management SNMP switch TACACS TACACS+ threats tion traffic updates users vendors Version VLAN VRRP vulnerabilities web server wireless WLAN workstations worm