|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn144529988 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
050721s2005 inua ob 001 0 eng d |
040 |
|
|
|a REB
|b eng
|e pn
|c REB
|d CEF
|d OCLCQ
|d MBB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d UAB
|d WYU
|d RDF
|d CNCEN
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 58752115
|a 59823339
|a 748094705
|a 1044284573
|a 1056382395
|a 1061027949
|a 1100905405
|
020 |
|
|
|z 0672327376
|
020 |
|
|
|z 9780672327377
|
024 |
8 |
|
|a 9780672327377
|
024 |
8 |
|
|a 0672327376
|
029 |
1 |
|
|a AU@
|b 000067114103
|
035 |
|
|
|a (OCoLC)144529988
|z (OCoLC)58752115
|z (OCoLC)59823339
|z (OCoLC)748094705
|z (OCoLC)1044284573
|z (OCoLC)1056382395
|z (OCoLC)1061027949
|z (OCoLC)1100905405
|
050 |
|
4 |
|a TK5105.59
|b .I53 2005
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Inside network perimeter security /
|c Stephen Northcutt [and others].
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Sams Pub.,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xxxii, 734 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g I.
|t essentials of network perimeter security --
|g 1.
|t Perimeter security fundamentals --
|g 2.
|t Packet filtering --
|g 3.
|t Stateful firewalls --
|g 4.
|t Proxy firewalls --
|g 5.
|t Security policy --
|g II.
|t Fortifying the security perimeter --
|g 6.
|t role of a router --
|g 7.
|t Virtual private networks --
|g 8.
|t Network intrusion detection --
|g 9.
|t Host hardening --
|g 10.
|t Host defense components --
|g 11.
|t Intrusion prevention systems --
|g III.
|t Designing a secure network perimeter --
|g 12.
|t Fundamentals of secure perimeter design --
|g 13.
|t Separating resources --
|g 14.
|t Wireless network security --
|g 15.
|t Software architecture --
|g 16.
|t VPN integration --
|g 17.
|t Tuning the design for performance --
|g 18.
|t Sample designs --
|g IV.
|t Maintaining and monitoring perimeter security --
|g 19.
|t Maintaining a security perimeter --
|g 20.
|t Network log analysis --
|g 21.
|t Troubleshooting defense components --
|g 22.
|t Assessment techniques --
|g 23.
|t Design under fire --
|g 24.
|t unified security perimeter : the importance of defense in depth --
|g App. A.
|t Cisco access list sample configurations --
|g App. B.
|t Crypto 101.
|
520 |
|
|
|a Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
|
542 |
|
|
|f Copyright © 2005 by Sams Publishing
|g 2005
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Northcutt, Stephen.
|
776 |
0 |
8 |
|i Print version:
|t Inside network perimeter security.
|b 2nd ed.
|d Indianapolis, Ind. : Sams Pub., ©2005
|w (DLC) 2004096804
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0672327376/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|