Security sage's guide to hardening the network infrastructure / (Record no. 11803)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02576nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | AUA.1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20140311153916.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140311t xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1931836019 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781931836012 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AUA |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Andrés, Steven |
9 (RLIN) | 42328 |
245 ## - TITLE STATEMENT | |
Title | Security sage's guide to hardening the network infrastructure / |
Statement of responsibility, etc | Steven Andrés; Brian Kenyon |
246 ## - VARYING FORM OF TITLE | |
Title proper/short title | Guide to hardening the network infrastructure / |
246 ## - VARYING FORM OF TITLE | |
Title proper/short title | Hardening the network infrastructure / |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Rockland, MA : |
Name of publisher, distributor, etc | Syngress, |
Date of publication, distribution, etc | ©2004. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxx, 512 p. : |
Other physical details | : ill. ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Defining Perimeter and Internal Segments --<br/>Internal versus External Segments --<br/>Explaining the External Segment or Perimeter Segment --<br/>The Internal Segment Explained --<br/>Footprinting: Finding the IP Addresses Assigned to Your Company --<br/>Using whois to Understand Who You Are --<br/>Using DNS Interrogation for More Information --<br/>Assessing Your Current Networks --<br/>Monitoring Traffic --<br/>Sniffing --<br/>Counting the Counters --<br/>Looking at Logical Layouts --<br/>Get on the Bus --<br/>Network Mapping 1-2-3 --<br/>Performing Security Audits --<br/>Vulnerability Assessment --<br/>Remediation --<br/>Follow-Up --<br/>Examining the Physical Security --<br/>Who's Knocking on Your NOC? --<br/>Extra Ports Equal Extra Headaches --<br/>Selecting the Correct Firewall --<br/>Understanding Firewall Basics --<br/>Seal of Approval --<br/>Security Rules --<br/>Hardware or Software --<br/>Administrative Interfaces --<br/>Traffic Interfaces --<br/>Logging --<br/>Optional Features --<br/>Exploring Stateful Packet Firewalls --<br/>What Is a Stateless Firewall? --<br/>Keeping Track of Conversations --<br/>Too Much Chatter --<br/>Stateful Failover --<br/>Explaining Proxy-Based Firewalls --<br/>Gophers --<br/>Modernization: The Evolution of Gophers --<br/>Explaining Packet Layers: An Analogy --<br/>Employee Monitoring --<br/>Examining Various Firewall Vendors --<br/>3Com Corporation and Sonic Wall, Inc. --<br/>Check Point Software Technologies --<br/>Cisco Systems, Inc. --<br/>CyberGuard --<br/>Microsoft ISA Server --<br/>NetScreen --<br/>Novell --<br/>Secure Computing --<br/>Stonesoft, Inc. --<br/>Symantec Corporation --<br/>WatchGuard Technologies, Inc. --<br/>Firewall Manipulation: Attacks and Defenses. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 42329 |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kenyon, Brian |
9 (RLIN) | 42330 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Classification part | TK 5105.59 |
Item part | .A547 2004 |
Price effective from | Barcode | Cost, replacement price | Date last seen | Damaged status | Withdrawn status | Current library | Lost status | Full call number | Date acquired | Collection code | Serial Enumeration / chronology | Not for loan | Shelving location | Source of classification or shelving scheme | Cost, normal purchase price | Koha item type | Home library | Source of acquisition |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
11/03/2014 | AUA014545 | 59.95 | 11/03/2014 | Judith Thomas Library | TK 5105.59 .A547 2004 | 11/03/2014 | 14674 | Library of Congress Classification | 59.95 | Books | Judith Thomas Library | |||||||
11/03/2014 | AUA014545 | 59.95 | 11/03/2014 | Judith Thomas Library | TK 5105.59 .A547 2004 | 11/03/2014 | AUA014545 | General Stacks | Library of Congress Classification | 59.95 | Books | Judith Thomas Library | Donation, Dr. P. Willard Munger III |