The Resource Security Sage's Guide to Hardening the Network Infrastructure, (electronic resource)

Security Sage's Guide to Hardening the Network Infrastructure, (electronic resource)

Label
Security Sage's Guide to Hardening the Network Infrastructure
Title
Security Sage's Guide to Hardening the Network Infrastructure
Title variation
Hardening the network infrastructure
Creator
Contributor
Subject
Genre
Language
eng
Summary
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators u
Cataloging source
AU-PeEL
http://library.link/vocab/creatorName
Andres, Steven
Dewey number
005.8
LC call number
TK5105.59
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Kenyon, Brian
  • Pack Birkholz, Erik
http://library.link/vocab/subjectName
  • Computer networks - Security measures
  • Computer networks
Label
Security Sage's Guide to Hardening the Network Infrastructure, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Contents
  • Front Cover; Security Sage's Guide to Hardening the Network Infrastructure; Copyright Page; Contents; Foreword; Chapter 1. Defining Perimeter and Internal Segments; Introduction; Internal versus External Segments; Footprinting: Finding the IP Addresses Assigned to Your Company; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 2. Assessing Your Current Networks; Introduction; Monitoring Traffic; Looking at Logical Layouts; Performing Security Audits; Examining the Physical Security; Checklist; Summary; Solutions Fast Track
  • Links to SitesMailing Lists; Frequently Asked Questions; Chapter 3. Selecting the Correct Firewall; Introduction; Understanding Firewall Basics; Exploring Stateful Packet Firewalls; Explaining Proxy-Based Firewalls; Examining Various Firewall Vendors; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 4. Firewall Manipulation: Attacks and Defenses; Introduction; Firewall Attack Methods; Check Point Software Attacks and Solutions; Cisco PIX Attacks and Solutions; Microsoft ISA Server Attacks and Solutions
  • NetScreen Firewall Attacks and MitigationsNovell BorderManager Attacks and Solutions; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 5. Routing Devices and Protocols; Introduction; Understanding the Roles of Routers on Your Network; Securing Your Routers; IP Routing Devices; IP Routing Protocols; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 6. Secure Network Management; Introduction; Network Management and Security Principles; Management Networks; IPSec and VPNs
  • Network Management Tools and UsesChecklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 7. Network Switching; Introduction; Understanding the Open Systems Interconnect Reference Model; The Origin of Switching; Evaluating Switching Standards and Features; Moving Switching beyond Layer 2; Using Switching to Improve Security; Choosing the Right Switch; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 8. Defending Routers and Switches; Introduction
  • Attacking and Defending Your Network DevicesCisco IPv4 Denial of Service; Cisco HTTP Get Buffer Overflow and UDP Memory Disclosure; Cisco Discovery Protocol Denial of Service; Confusing the Enemy; Breaking Out of Jail; Attacking Simple Network Management Protocol; Vulnerability Chaining; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 9. Implementing Intrusion Detection Systems; Introduction; Understanding Intrusion Detection and Prevention Basics; Comparing IDS/IPS Vendors; Subverting an IDS/IPS; Summary; Checklists
  • Solutions Fast Track
Dimensions
unknown
Extent
1 online resource (543 p.)
Form of item
electronic
Isbn
9780080480831
Specific material designation
remote
System control number
  • (CKB)111090529274938
  • (EBL)294359
  • (OCoLC)559259650
  • (EXLCZ)99111090529274938
Label
Security Sage's Guide to Hardening the Network Infrastructure, (electronic resource)
Publication
Note
Description based upon print version of record
Contents
  • Front Cover; Security Sage's Guide to Hardening the Network Infrastructure; Copyright Page; Contents; Foreword; Chapter 1. Defining Perimeter and Internal Segments; Introduction; Internal versus External Segments; Footprinting: Finding the IP Addresses Assigned to Your Company; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 2. Assessing Your Current Networks; Introduction; Monitoring Traffic; Looking at Logical Layouts; Performing Security Audits; Examining the Physical Security; Checklist; Summary; Solutions Fast Track
  • Links to SitesMailing Lists; Frequently Asked Questions; Chapter 3. Selecting the Correct Firewall; Introduction; Understanding Firewall Basics; Exploring Stateful Packet Firewalls; Explaining Proxy-Based Firewalls; Examining Various Firewall Vendors; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 4. Firewall Manipulation: Attacks and Defenses; Introduction; Firewall Attack Methods; Check Point Software Attacks and Solutions; Cisco PIX Attacks and Solutions; Microsoft ISA Server Attacks and Solutions
  • NetScreen Firewall Attacks and MitigationsNovell BorderManager Attacks and Solutions; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 5. Routing Devices and Protocols; Introduction; Understanding the Roles of Routers on Your Network; Securing Your Routers; IP Routing Devices; IP Routing Protocols; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 6. Secure Network Management; Introduction; Network Management and Security Principles; Management Networks; IPSec and VPNs
  • Network Management Tools and UsesChecklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 7. Network Switching; Introduction; Understanding the Open Systems Interconnect Reference Model; The Origin of Switching; Evaluating Switching Standards and Features; Moving Switching beyond Layer 2; Using Switching to Improve Security; Choosing the Right Switch; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 8. Defending Routers and Switches; Introduction
  • Attacking and Defending Your Network DevicesCisco IPv4 Denial of Service; Cisco HTTP Get Buffer Overflow and UDP Memory Disclosure; Cisco Discovery Protocol Denial of Service; Confusing the Enemy; Breaking Out of Jail; Attacking Simple Network Management Protocol; Vulnerability Chaining; Checklist; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 9. Implementing Intrusion Detection Systems; Introduction; Understanding Intrusion Detection and Prevention Basics; Comparing IDS/IPS Vendors; Subverting an IDS/IPS; Summary; Checklists
  • Solutions Fast Track
Dimensions
unknown
Extent
1 online resource (543 p.)
Form of item
electronic
Isbn
9780080480831
Specific material designation
remote
System control number
  • (CKB)111090529274938
  • (EBL)294359
  • (OCoLC)559259650
  • (EXLCZ)99111090529274938

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...