000 | 02576nam a22002657a 4500 | ||
---|---|---|---|
003 | AUA.1 | ||
005 | 20140311153916.0 | ||
008 | 140311t xxu||||| |||| 00| 0 eng d | ||
020 | _a1931836019 | ||
020 | _a9781931836012 | ||
040 | _cAUA | ||
050 | _aTK5105.59 | ||
100 |
_aAndrés, Steven _942328 |
||
245 |
_aSecurity sage's guide to hardening the network infrastructure / _cSteven Andrés; Brian Kenyon |
||
246 | _aGuide to hardening the network infrastructure / | ||
246 | _aHardening the network infrastructure / | ||
260 |
_aRockland, MA : _bSyngress, _c©2004. |
||
300 |
_axxx, 512 p. : _b: ill. ; _c24 cm. |
||
504 | _aIncludes index. | ||
505 | _a Defining Perimeter and Internal Segments -- Internal versus External Segments -- Explaining the External Segment or Perimeter Segment -- The Internal Segment Explained -- Footprinting: Finding the IP Addresses Assigned to Your Company -- Using whois to Understand Who You Are -- Using DNS Interrogation for More Information -- Assessing Your Current Networks -- Monitoring Traffic -- Sniffing -- Counting the Counters -- Looking at Logical Layouts -- Get on the Bus -- Network Mapping 1-2-3 -- Performing Security Audits -- Vulnerability Assessment -- Remediation -- Follow-Up -- Examining the Physical Security -- Who's Knocking on Your NOC? -- Extra Ports Equal Extra Headaches -- Selecting the Correct Firewall -- Understanding Firewall Basics -- Seal of Approval -- Security Rules -- Hardware or Software -- Administrative Interfaces -- Traffic Interfaces -- Logging -- Optional Features -- Exploring Stateful Packet Firewalls -- What Is a Stateless Firewall? -- Keeping Track of Conversations -- Too Much Chatter -- Stateful Failover -- Explaining Proxy-Based Firewalls -- Gophers -- Modernization: The Evolution of Gophers -- Explaining Packet Layers: An Analogy -- Employee Monitoring -- Examining Various Firewall Vendors -- 3Com Corporation and Sonic Wall, Inc. -- Check Point Software Technologies -- Cisco Systems, Inc. -- CyberGuard -- Microsoft ISA Server -- NetScreen -- Novell -- Secure Computing -- Stonesoft, Inc. -- Symantec Corporation -- WatchGuard Technologies, Inc. -- Firewall Manipulation: Attacks and Defenses. | ||
650 |
_aComputer networks _xSecurity measures. _942329 |
||
700 |
_aKenyon, Brian _942330 |
||
942 |
_2lcc _cBOOK _hTK 5105.59 _i.A547 2004 |
||
999 |
_c11803 _d11803 |
||
952 |
_w2014-03-11 _pAUA014545 _v59.95 _r2014-03-11 _40 _00 _bAUA.1 _10 _oTK 5105.59 .A547 2004 _d2014-03-11 _8BKS _h14674 _70 _cGeneral Stacks _2lcc _g59.95 _yBOOK _aAUA.1 |