Inside network perimeter security /
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do ma...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Sams Pub.,
©2005.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- I. essentials of network perimeter security
- 1. Perimeter security fundamentals
- 2. Packet filtering
- 3. Stateful firewalls
- 4. Proxy firewalls
- 5. Security policy
- II. Fortifying the security perimeter
- 6. role of a router
- 7. Virtual private networks
- 8. Network intrusion detection
- 9. Host hardening
- 10. Host defense components
- 11. Intrusion prevention systems
- III. Designing a secure network perimeter
- 12. Fundamentals of secure perimeter design
- 13. Separating resources
- 14. Wireless network security
- 15. Software architecture
- 16. VPN integration
- 17. Tuning the design for performance
- 18. Sample designs
- IV. Maintaining and monitoring perimeter security
- 19. Maintaining a security perimeter
- 20. Network log analysis
- 21. Troubleshooting defense components
- 22. Assessment techniques
- 23. Design under fire
- 24. unified security perimeter : the importance of defense in depth
- App. A. Cisco access list sample configurations
- App. B. Crypto 101.