Cargando…

Inside network perimeter security /

Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do ma...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Northcutt, Stephen
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Sams Pub., ©2005.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn144529988
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 050721s2005 inua ob 001 0 eng d
040 |a REB  |b eng  |e pn  |c REB  |d CEF  |d OCLCQ  |d MBB  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d UAB  |d WYU  |d RDF  |d CNCEN  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 58752115  |a 59823339  |a 748094705  |a 1044284573  |a 1056382395  |a 1061027949  |a 1100905405 
020 |z 0672327376 
020 |z 9780672327377 
024 8 |a 9780672327377 
024 8 |a 0672327376 
029 1 |a AU@  |b 000067114103 
035 |a (OCoLC)144529988  |z (OCoLC)58752115  |z (OCoLC)59823339  |z (OCoLC)748094705  |z (OCoLC)1044284573  |z (OCoLC)1056382395  |z (OCoLC)1061027949  |z (OCoLC)1100905405 
050 4 |a TK5105.59  |b .I53 2005 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Inside network perimeter security /  |c Stephen Northcutt [and others]. 
250 |a 2nd ed. 
260 |a Indianapolis, Ind. :  |b Sams Pub.,  |c ©2005. 
300 |a 1 online resource (xxxii, 734 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 0 |g I.  |t essentials of network perimeter security --  |g 1.  |t Perimeter security fundamentals --  |g 2.  |t Packet filtering --  |g 3.  |t Stateful firewalls --  |g 4.  |t Proxy firewalls --  |g 5.  |t Security policy --  |g II.  |t Fortifying the security perimeter --  |g 6.  |t role of a router --  |g 7.  |t Virtual private networks --  |g 8.  |t Network intrusion detection --  |g 9.  |t Host hardening --  |g 10.  |t Host defense components --  |g 11.  |t Intrusion prevention systems --  |g III.  |t Designing a secure network perimeter --  |g 12.  |t Fundamentals of secure perimeter design --  |g 13.  |t Separating resources --  |g 14.  |t Wireless network security --  |g 15.  |t Software architecture --  |g 16.  |t VPN integration --  |g 17.  |t Tuning the design for performance --  |g 18.  |t Sample designs --  |g IV.  |t Maintaining and monitoring perimeter security --  |g 19.  |t Maintaining a security perimeter --  |g 20.  |t Network log analysis --  |g 21.  |t Troubleshooting defense components --  |g 22.  |t Assessment techniques --  |g 23.  |t Design under fire --  |g 24.  |t unified security perimeter : the importance of defense in depth --  |g App. A.  |t Cisco access list sample configurations --  |g App. B.  |t Crypto 101. 
520 |a Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates. 
542 |f Copyright © 2005 by Sams Publishing  |g 2005 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Northcutt, Stephen. 
776 0 8 |i Print version:  |t Inside network perimeter security.  |b 2nd ed.  |d Indianapolis, Ind. : Sams Pub., ©2005  |w (DLC) 2004096804 
856 4 0 |u https://learning.oreilly.com/library/view/~/0672327376/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP