000 02576nam a22002657a 4500
003 AUA.1
005 20140311153916.0
008 140311t xxu||||| |||| 00| 0 eng d
020 _a1931836019
020 _a9781931836012
040 _cAUA
050 _aTK5105.59
100 _aAndrés, Steven
_942328
245 _aSecurity sage's guide to hardening the network infrastructure /
_cSteven Andrés; Brian Kenyon
246 _aGuide to hardening the network infrastructure /
246 _aHardening the network infrastructure /
260 _aRockland, MA :
_bSyngress,
_c©2004.
300 _axxx, 512 p. :
_b: ill. ;
_c24 cm.
504 _aIncludes index.
505 _a Defining Perimeter and Internal Segments -- Internal versus External Segments -- Explaining the External Segment or Perimeter Segment -- The Internal Segment Explained -- Footprinting: Finding the IP Addresses Assigned to Your Company -- Using whois to Understand Who You Are -- Using DNS Interrogation for More Information -- Assessing Your Current Networks -- Monitoring Traffic -- Sniffing -- Counting the Counters -- Looking at Logical Layouts -- Get on the Bus -- Network Mapping 1-2-3 -- Performing Security Audits -- Vulnerability Assessment -- Remediation -- Follow-Up -- Examining the Physical Security -- Who's Knocking on Your NOC? -- Extra Ports Equal Extra Headaches -- Selecting the Correct Firewall -- Understanding Firewall Basics -- Seal of Approval -- Security Rules -- Hardware or Software -- Administrative Interfaces -- Traffic Interfaces -- Logging -- Optional Features -- Exploring Stateful Packet Firewalls -- What Is a Stateless Firewall? -- Keeping Track of Conversations -- Too Much Chatter -- Stateful Failover -- Explaining Proxy-Based Firewalls -- Gophers -- Modernization: The Evolution of Gophers -- Explaining Packet Layers: An Analogy -- Employee Monitoring -- Examining Various Firewall Vendors -- 3Com Corporation and Sonic Wall, Inc. -- Check Point Software Technologies -- Cisco Systems, Inc. -- CyberGuard -- Microsoft ISA Server -- NetScreen -- Novell -- Secure Computing -- Stonesoft, Inc. -- Symantec Corporation -- WatchGuard Technologies, Inc. -- Firewall Manipulation: Attacks and Defenses.
650 _aComputer networks
_xSecurity measures.
_942329
700 _aKenyon, Brian
_942330
942 _2lcc
_cBOOK
_hTK 5105.59
_i.A547 2004
999 _c11803
_d11803
952 _w2014-03-11
_pAUA014545
_v59.95
_r2014-03-11
_40
_00
_bAUA.1
_10
_oTK 5105.59 .A547 2004
_d2014-03-11
_8BKS
_h14674
_70
_cGeneral Stacks
_2lcc
_g59.95
_yBOOK
_aAUA.1