Hardening Network Infrastructure

Wes Noonan

  • 出版商: McGraw-Hill Education
  • 出版日期: 2004-05-06
  • 定價: $1,360
  • 售價: 5.0$680
  • 語言: 英文
  • 頁數: 552
  • 裝訂: Paperback
  • ISBN: 0072255021
  • ISBN-13: 9780072255027
  • 相關分類: 資訊安全
  • 立即出貨 (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed, here is a brilliant new offering written with a passion for security that will help you make the necessary upgrades and take the essential steps to secure your network infrastructure. The concise and consistent approach breaks down security into logical parts, giving you actions to take immediately, information on hardening your system from the top down, and finally when to go back and make further upgrades.

            

  Part I: Do This Now!


   Ch. 1. Do these 6 things before you do anything else!

   Ch. 2. Hardening Your Perimeter Network

   Ch. 3. Firewalls, IDS, IDP

   Ch. 4. Hardening Your External Access Connections Including VPN, Dial-in and Remote Access

   Ch. 5. Hardening Your Perimeter Routers and Switches

  C h. 6. Positioning and Deploying Content Filters/Application Proxies

   Ch. 7. Utilizing Your Perimeter Devices to Implement a Secure Perimeter 

   Ch. 8. Using Firewalls, IDS and IDP to Harden Your Internal Network

   Ch. 9. Hardening Internal Routers, Switches

   Ch. 10. Hardening Wireless LAN Connections

   Ch. 11. Hardening Intersite Locations and WAN Connections

   Ch. 12. Implement Access Authorization

   Ch. 13. Implement an Enterprise Monitoring Solution

   Ch. 14. How to Implement a Secure Internal Network

  Part III: Once is Never Enough!


   Ch. 15. Review Your Security Policy, Posture and Auditing

   Ch. 16. Patches and Upgrades

   Ch. 17. Managing Changes to Your Policy

  Part IV: How to Succeed at Hardening Your Network Infrastructure


   Ch. 18. Where Does the Money Come From and Setting Perceptions
   Ch. 19. Staffing and Training Issues

   Ch. 20. Handling Security Failures
  Appendix A: Additional Infrastructure Security Resources