
Inside Network Perimeter Security
Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent, Ron Ritchey
Résumé
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
L'auteur - Stephen Northcutt
Stephen Northcutt s'occupe de guerre de l'information au Ballistic Missile Défense Organisation. Il est également directeur des enseignements et certifications à l'institut SANS (SysAdmin, Audit, Network, Security), la source d'information en matière de sécurité informatique la plus réputée au monde.
L'auteur - Lenny Zeltser
Lenny Zeltser's work in information security draws upon experience in system administration, software architecture, and independent research. Lenny has worked as a consultant to a major financial institution and has co-founded a software company, and is presently a Director of Information Security at Kiodex, Inc. He has also written and presented coursework for the SANS Institute and reverse-engineered malicious software; he is an active member of several security certification advisory boards as well.
L'auteur - Scott Winters
Scott Winters has been working in all aspects of networking and computer security for 12 years. He has been an instructor, author, network engineer, consultant, and systems administrator and has worked with various perimeter security solutions, firewalls, and infrastructure designs. He has SANS GIAC GSEC, GCFW, and GCFW certifications, as well as MCSE, CNE, and Cisco CCNA and other technology certifications. Scott's other accomplishments include the authoring and editing of a SANS GIAC training and certification course and exam content. He has also been involved in the SANS GIAC mentoring program, and has served on the SANS GCFW Advisory Board.
L'auteur - Karen Kent
Karen Kent is an Associate with Booz Allen Hamilton, where she provides guidance to Federal agencies on a broad range of information assurance concerns, including incident handling, intrusion detection, VPNs, log monitoring, and host security.
L'auteur - Ron Ritchey
Ron Ritchey is an authority in the areas of secure network design and network intrusion and regularly leads penetration testing efforts for Booz Allen Hamilton, where he has had the opportunity to learn first-hand the real-world impact of network vulnerabilities. He is also an active researcher in the field with peer-reviewed publications in the area of automated network security analysis. Ron holds a master's degree in computer science from George Mason University and is currently pursuing his Ph.D. in information technology at their School of Information Technology and Engineering. His doctoral research is attempting to automate network security analysis.
Sommaire
- THE ESSENTIALS OF NETWORK PERIMETER SECURITY
- Perimeter Security Fundamentals
- Packet Filtering
- Stateful Firewalls
- Proxy Firewalls
- Security Policy
- FORTIFYING THE SECURITY PERIMETER
- The Role of a Router
- Virtual Private Networks
- Network Intrusion Detection
- Host Hardening
- Host Defense Components
- Intrusion Prevention Systems
- DESIGNING A SECURE NETWORK PERIMETER
- Fundamentals of Secure Perimeter Design
- Separating Resources
- Wireless Network Security
- Software Architecture
- VPN Integration
- Tuning the Design for Performance
- Sample Designs
- MAINTAINING AND MONITORING PERIMETER SECURITY
- Maintaining a Security Perimeter
- Network Log Analysis
- Troubleshooting Defense Components
- Assessment Techniques
- Design Under Fire
- A Unified Security Perimeter: The Importance of Defense in Depth
- APPENDIXES
- A. Cisco Access List Sample Configurations
- B. Crypto 101
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Sams |
Auteur(s) | Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent, Ron Ritchey |
Parution | 27/05/2005 |
Édition | 2eme édition |
Nb. de pages | 720 |
Format | 17,5 x 23 |
Couverture | Broché |
Poids | 1200g |
Intérieur | Noir et Blanc |
EAN13 | 9780672327377 |
ISBN13 | 978-0-672-32737-7 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet