Security sage's guide to hardening the network infrastructure /

Andrés, Steven

Security sage's guide to hardening the network infrastructure / Guide to hardening the network infrastructure / Hardening the network infrastructure / Steven Andrés; Brian Kenyon - Rockland, MA : Syngress, ©2004. - xxx, 512 p. : : ill. ; 24 cm.

Includes index.

Defining Perimeter and Internal Segments --
Internal versus External Segments --
Explaining the External Segment or Perimeter Segment --
The Internal Segment Explained --
Footprinting: Finding the IP Addresses Assigned to Your Company --
Using whois to Understand Who You Are --
Using DNS Interrogation for More Information --
Assessing Your Current Networks --
Monitoring Traffic --
Sniffing --
Counting the Counters --
Looking at Logical Layouts --
Get on the Bus --
Network Mapping 1-2-3 --
Performing Security Audits --
Vulnerability Assessment --
Remediation --
Follow-Up --
Examining the Physical Security --
Who's Knocking on Your NOC? --
Extra Ports Equal Extra Headaches --
Selecting the Correct Firewall --
Understanding Firewall Basics --
Seal of Approval --
Security Rules --
Hardware or Software --
Administrative Interfaces --
Traffic Interfaces --
Logging --
Optional Features --
Exploring Stateful Packet Firewalls --
What Is a Stateless Firewall? --
Keeping Track of Conversations --
Too Much Chatter --
Stateful Failover --
Explaining Proxy-Based Firewalls --
Gophers --
Modernization: The Evolution of Gophers --
Explaining Packet Layers: An Analogy --
Employee Monitoring --
Examining Various Firewall Vendors --
3Com Corporation and Sonic Wall, Inc. --
Check Point Software Technologies --
Cisco Systems, Inc. --
CyberGuard --
Microsoft ISA Server --
NetScreen --
Novell --
Secure Computing --
Stonesoft, Inc. --
Symantec Corporation --
WatchGuard Technologies, Inc. --
Firewall Manipulation: Attacks and Defenses.

1931836019 9781931836012


Computer networks--Security measures.

TK5105.59