Cover image for Security Sage's Guide to Hardening the Network Infrastructure.
Security Sage's Guide to Hardening the Network Infrastructure.
Title:
Security Sage's Guide to Hardening the Network Infrastructure.
Author:
Andres, Steven.
ISBN:
9780080480831
Personal Author:
Physical Description:
1 online resource (543 pages)
Contents:
Front Cover -- Security Sage's Guide to Hardening the Network Infrastructure -- Copyright Page -- Contents -- Foreword -- Chapter 1. Defining Perimeter and Internal Segments -- Introduction -- Internal versus External Segments -- Footprinting: Finding the IP Addresses Assigned to Your Company -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 2. Assessing Your Current Networks -- Introduction -- Monitoring Traffic -- Looking at Logical Layouts -- Performing Security Audits -- Examining the Physical Security -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 3. Selecting the Correct Firewall -- Introduction -- Understanding Firewall Basics -- Exploring Stateful Packet Firewalls -- Explaining Proxy-Based Firewalls -- Examining Various Firewall Vendors -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 4. Firewall Manipulation: Attacks and Defenses -- Introduction -- Firewall Attack Methods -- Check Point Software Attacks and Solutions -- Cisco PIX Attacks and Solutions -- Microsoft ISA Server Attacks and Solutions -- NetScreen Firewall Attacks and Mitigations -- Novell BorderManager Attacks and Solutions -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 5. Routing Devices and Protocols -- Introduction -- Understanding the Roles of Routers on Your Network -- Securing Your Routers -- IP Routing Devices -- IP Routing Protocols -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 6. Secure Network Management -- Introduction -- Network Management and Security Principles -- Management Networks.

IPSec and VPNs -- Network Management Tools and Uses -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 7. Network Switching -- Introduction -- Understanding the Open Systems Interconnect Reference Model -- The Origin of Switching -- Evaluating Switching Standards and Features -- Moving Switching beyond Layer 2 -- Using Switching to Improve Security -- Choosing the Right Switch -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 8. Defending Routers and Switches -- Introduction -- Attacking and Defending Your Network Devices -- Cisco IPv4 Denial of Service -- Cisco HTTP Get Buffer Overflow and UDP Memory Disclosure -- Cisco Discovery Protocol Denial of Service -- Confusing the Enemy -- Breaking Out of Jail -- Attacking Simple Network Management Protocol -- Vulnerability Chaining -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 9. Implementing Intrusion Detection Systems -- Introduction -- Understanding Intrusion Detection and Prevention Basics -- Comparing IDS/IPS Vendors -- Subverting an IDS/IPS -- Summary -- Checklists -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 10. Perimeter Network Design -- Introduction -- Looking at Design Principles -- Designing an Internet Access Network -- Designing Internet Application Networks -- Designing VPN and Remote Access Termination Networks -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists -- Frequently Asked Questions -- Chapter 11. Internal Network Design -- Introduction -- Design Principles and Examples -- Proper Segmentation -- Checklist -- Summary -- Solutions Fast Track -- Links to Sites -- Mailing Lists.

Frequently Asked Questions -- Index.
Abstract:
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise. * This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures * It offers unique coverage of network design so administrators understand how they should design and protect their enterprises * Helps provide real practical solutions and not just background theory.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: