Amazon cover image
Image from Amazon.com

Security sage's guide to hardening the network infrastructure / Steven Andrés; Brian Kenyon

By: Contributor(s): Material type: TextTextPublication details: Rockland, MA : Syngress, ©2004.Description: xxx, 512 p. : : ill. ; 24 cmISBN:
  • 1931836019
  • 9781931836012
Other title:
  • Guide to hardening the network infrastructure
  • Hardening the network infrastructure
Subject(s): LOC classification:
  • TK5105.59
Contents:
Defining Perimeter and Internal Segments -- Internal versus External Segments -- Explaining the External Segment or Perimeter Segment -- The Internal Segment Explained -- Footprinting: Finding the IP Addresses Assigned to Your Company -- Using whois to Understand Who You Are -- Using DNS Interrogation for More Information -- Assessing Your Current Networks -- Monitoring Traffic -- Sniffing -- Counting the Counters -- Looking at Logical Layouts -- Get on the Bus -- Network Mapping 1-2-3 -- Performing Security Audits -- Vulnerability Assessment -- Remediation -- Follow-Up -- Examining the Physical Security -- Who's Knocking on Your NOC? -- Extra Ports Equal Extra Headaches -- Selecting the Correct Firewall -- Understanding Firewall Basics -- Seal of Approval -- Security Rules -- Hardware or Software -- Administrative Interfaces -- Traffic Interfaces -- Logging -- Optional Features -- Exploring Stateful Packet Firewalls -- What Is a Stateless Firewall? -- Keeping Track of Conversations -- Too Much Chatter -- Stateful Failover -- Explaining Proxy-Based Firewalls -- Gophers -- Modernization: The Evolution of Gophers -- Explaining Packet Layers: An Analogy -- Employee Monitoring -- Examining Various Firewall Vendors -- 3Com Corporation and Sonic Wall, Inc. -- Check Point Software Technologies -- Cisco Systems, Inc. -- CyberGuard -- Microsoft ISA Server -- NetScreen -- Novell -- Secure Computing -- Stonesoft, Inc. -- Symantec Corporation -- WatchGuard Technologies, Inc. -- Firewall Manipulation: Attacks and Defenses.
Item type: Books
Holdings
Current library Collection Call number Vol info Status Date due Barcode
Judith Thomas Library General Stacks BKS TK 5105.59 .A547 2004 (Browse shelf(Opens below)) AUA014545 Available AUA014545
Browsing Judith Thomas Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)

Includes index.

Defining Perimeter and Internal Segments --
Internal versus External Segments --
Explaining the External Segment or Perimeter Segment --
The Internal Segment Explained --
Footprinting: Finding the IP Addresses Assigned to Your Company --
Using whois to Understand Who You Are --
Using DNS Interrogation for More Information --
Assessing Your Current Networks --
Monitoring Traffic --
Sniffing --
Counting the Counters --
Looking at Logical Layouts --
Get on the Bus --
Network Mapping 1-2-3 --
Performing Security Audits --
Vulnerability Assessment --
Remediation --
Follow-Up --
Examining the Physical Security --
Who's Knocking on Your NOC? --
Extra Ports Equal Extra Headaches --
Selecting the Correct Firewall --
Understanding Firewall Basics --
Seal of Approval --
Security Rules --
Hardware or Software --
Administrative Interfaces --
Traffic Interfaces --
Logging --
Optional Features --
Exploring Stateful Packet Firewalls --
What Is a Stateless Firewall? --
Keeping Track of Conversations --
Too Much Chatter --
Stateful Failover --
Explaining Proxy-Based Firewalls --
Gophers --
Modernization: The Evolution of Gophers --
Explaining Packet Layers: An Analogy --
Employee Monitoring --
Examining Various Firewall Vendors --
3Com Corporation and Sonic Wall, Inc. --
Check Point Software Technologies --
Cisco Systems, Inc. --
CyberGuard --
Microsoft ISA Server --
NetScreen --
Novell --
Secure Computing --
Stonesoft, Inc. --
Symantec Corporation --
WatchGuard Technologies, Inc. --
Firewall Manipulation: Attacks and Defenses.