How to cheat at securing your network /
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress,
©2007.
|
Colección: | "How to cheat--"
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Front Cover; How to Cheat at Securing Your Network; Copyright Page; Contents; Chapter 1. General Security Concepts: Access Control, Authentication, and Auditing; Introduction to AAA; Access Control; Authentication; Auditing; Disabling Non-essential Services, Protocols, Systems and Processes; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. General Security Concepts: Attacks; Attacks; Active Attacks; Social Engineering; Vulnerability Scanning; Passive Attacks; Password Attacks; Malicious Code Attacks; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 3. Communication Security: Remote Access and MessagingIntroduction; The Need for Communication Security; Remote Access Security; E-mail Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Communication Security: Wireless; Introduction; Wireless Concepts; Wireless Vulnerabilities; Site Surveys; Implementing Wireless Security: Common Best Practices; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Communication Security: Web Based Services; Introduction; Web Security; FTP Security; Directory Services and LDAP Security; Summary
- Solutions Fast TrackFrequently Asked Questions; Chapter 6. Infrastructure Security: Devices and Media; Introduction; Device-based Security; Media-based Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Topologies and IDS; Introduction; Security Topologies; Intrusion Detection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Infrastructure Security: System Hardening; Introduction; Concepts and Processes of OS and NOS Hardening; Network Hardening; Application Hardening; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 9. Basics of CryptographyIntroduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Public Key Infrastructure; Introduction; PKI; Key Management and Certificate Lifecycle; Summary; Solutions Fast Track; Frequently Asked Questions; Index