End-to-end network security : defense-in-depth /
End-to-End Network Security Defense-in-Depth Best practices for assessing and improving network defenses and responding to security incidents Omar Santos Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Cisco Press,
2007.
|
Colección: | Cisco Press networking technology series.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. I. Introduction to network security solutions
- Ch. 1. Overview of network security technologies
- pt. II. Security lifestyle : frameworks and methodologies
- Ch. 2. Preparation phase
- Ch. 3. Identifying and classifying security threats
- Ch. 4. Traceback
- Ch. 5. Reacting to security incidents
- Ch. 6. Postmortem and improvement
- Ch. 7. Proactive security framework
- pt. III. Defense-in-depth applied
- Ch. 8. Wireless security
- Ch. 9. IP telephony security
- Ch. 10. Data center security
- Ch. 11. IPv6 security
- pt. IV. Case studies
- Ch. 12. Case studies.