Active Defense - A Comprehensive Guide To Network Security

E-Book Overview

In one book, Brenton and Hunt deal with all the major issues you face when you want to make your network secure. The authors explain the need for security, identify the various security risks, show how to design a security policy and illustrate the problems poor security can allow to happen. Paying individual attention to NetWare, Windows and Unix environments, they describe how networks operate, and the authors discuss network cables, protocols, routers, bridges, hubs and switches from a security perspective. Brenton and Hunt explore security tools such as firewalls, Cisco router configuration settings, intrusion detection systems, authentication and encryption software, Virtual Private Networks (VPNs), viruses, trojans and worms.

E-Book Content

release TeamOR 2001 [x] web.security Active Defense — A Comprehensive Guide to Network Security Table of Contents Active Defense — A Comprehensive Guide to Network Security - 4 Introduction - 6 Chapter 1 - Why Secure Your Network? - 8 Chapter 2 - How Much Security Do You Need? - 14 Chapter 3 - Understanding How Network Systems Communicate - 27 Chapter 4 - Topology Security - 62 Chapter 5 - Firewalls - 81 Chapter 6 - Configuring Cisco Router Security Features - 116 Chapter 7 - Check Point’s FireWall-1 - 143 Chapter 8 - Intrusion Detection Systems - 168 Chapter 9 - Authentication and Encryption - 187 Chapter 10 - Virtual Private Networking - 202 Chapter 11 - Viruses, Trojans, and Worms: Oh My! - 218 Chapter 12 - Disaster Prevention and Recovery - 233 Chapter 13 - NetWare - 256 Chapter 14 - NT and Windows 2000 - 273 Chapter 15 - UNIX - 309 Chapter 16 - The Anatomy of an Attack - 334 Chapter 17 - Staying Ahead of Attacks - 352 Appendix A - About the CD-ROM - 366 Appen
You might also like

Computer Science Handbook
Authors: Allen B. Tucker    215    0



Spatial Data Modeling For 3d Gis
Authors: Alias Abdul-Rahman , Morakot Pilouk    137    0


Multimedia Image And Video Processing
Authors: Ling Guan , Sun-Yuan Kung , Jan Larsen (editors)    119    0


Lectures On Image Processing
Authors: Morse B.S.    147    0


Digital Image Processing: Piks Scientific Inside
Authors: William K. Pratt    154    0


Introduction To Lambda Calculus
Authors: Barendregt H. , Barendsen E.    134    0


Object-oriented Programming Via Fortran 90-95
Authors: Ed Akin    144    0


Principles Of Constraint Programming
Authors: Krzysztof Apt    135    0