Muutke küpsiste eelistusi

E-raamat: Computer Network Security

(Sidi Mohamed Ben Abdellah University, Morocco)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 25-Feb-2020
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119706748
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 171,60 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: PDF+DRM
  • Ilmumisaeg: 25-Feb-2020
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119706748
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration.

This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the Cisco Academy program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.

Preface xi
Introduction xiii
Chapter 1 Fundamentals of Network Security
1(14)
1.1 Introduction
1(3)
1.1.1 The main objectives of securing a network
2(1)
1.1.2 Information security terminology
2(2)
1.2 Types of network security
4(1)
1.2.1 Physical security
4(1)
1.2.2 Logical security
4(1)
1.2.3 Administrative security
5(1)
1.3 The main risks related to the logical security of the network
5(3)
1.3.1 Different kinds of network attacks
5(2)
1.3.2 Network security measures
7(1)
1.3.3 Vulnerability audit measures
8(1)
1.4 Exercises to test learning
8(7)
Chapter 2 Securing Network Devices
15(26)
2.1 Types of network traffic
15(1)
2.2 Securing the management plan
16(1)
2.3 Securing passwords
16(1)
2.4 Implementing connection restrictions
17(1)
2.4.1 Configuring a login banner
17(1)
2.4.2 Configuring connection parameters
17(1)
2.5 Securing access through console lines, VTY and auxiliaries
18(1)
2.5.1 Securing access through the console line and deactivating the auxiliary line
18(1)
2.5.2 Securing VTY access with ssh
18(1)
2.6 Allocation of administrative roles
19(5)
2.6.1 Privilege levels of the IOS system
19(1)
2.6.2 Configuring a privilege level
19(1)
2.6.3 Setting a privilege level per user
20(1)
2.6.4 Setting a privilege level for console, VTY, and auxiliary line access
20(1)
2.6.5 Securing access with the management of "views" and "super-views"
21(1)
2.6.6 Securing configuration files and the IOS system
22(1)
2.6.7 Using automated security features
23(1)
2.7 Securing the control plane
24(2)
2.7.1 Introduction
24(1)
2.7.2 MD5 authentication
24(1)
2.7.3 Configuring OSPF protocol authentication
24(1)
2.7.4 Configuring E1GRP protocol authentication
25(1)
2.7.5 Configuring RIP authentication
26(1)
2.8 Exercises for application
26(15)
Chapter 3 Supervising a Computer Network
41(26)
3.1 Introduction
41(1)
3.2 Implementing an NTP server
42(2)
3.2.1 Introduction to the NTP
42(1)
3.2.2 How the NTP works
42(1)
3.2.3 NTP configuration
43(1)
3.3 Implementing a Syslog server
44(2)
3.3.1 Introduction to the Syslog
44(1)
3.3.2 How Syslog works
45(1)
3.3.3 Configuring a Syslog client
46(1)
3.4 Implementing the Simple Network Management Protocol (SNMP)
46(4)
3.4.1 Introducing the SNMP
46(1)
3.4.2 How SNMP works
47(2)
3.4.3 SNMP configuration
49(1)
3.5 Exercises for application
50(17)
Chapter 4 Securing Access Using AAA
67(12)
4.1 Introduction
67(1)
4.2 AAA authentication
68(3)
4.2.1 Local AAA authentication
68(1)
4.2.2 AAA authentication based on a server
69(2)
4.3 AAA authorizations
71(1)
4.4 AAA traceability
71(1)
4.5 Exercises for application
72(7)
Chapter 5 Using Firewalls
79(22)
5.1 Introducing firewalls
80(1)
5.2 Types of firewalls
80(1)
5.3 Setting up a firewall
80(1)
5.4 Different firewall strategies
81(1)
5.5 ACL-based firewalls
81(3)
5.5.1 Introduction
81(1)
5.5.2 The location of ACLs
81(1)
5.5.3 IPv4 ACLs
81(1)
5.5.4 IPv6 ACLs
82(1)
5.5.5 ACL recommendation
83(1)
5.6 Zone-based firewalls
84(2)
5.6.1 Introduction
84(1)
5.6.2 Types of security zones in a network
84(1)
5.6.3 Rules applied to interzone traffic
85(1)
5.6.4 Terminology
86(1)
5.6.5 Configuring a ZFW
86(1)
5.7 Creating zones
86(1)
5.8 Creating Class-Maps
86(1)
5.9 Creating the Policy-Map to apply the Class-Maps
87(1)
5.10 Defining the zone pairs
87(1)
5.11 Applying the policy maps to the zone pairs
87(1)
5.12 Assigning interfaces to zones
87(1)
5.13 Exercises for application
88(13)
Chapter 6 Putting in Place an Intrusion Prevention System (IPS)
101(24)
6.1 Introduction to a detector
102(1)
6.2 The differences between an IDS and an IPS
102(1)
6.3 Types of IPS
103(1)
6.4 Cisco IP solutions
103(1)
6.5 Modes of deploying IPS
103(1)
6.6 Types of alarms
104(1)
6.7 Detecting malicious traffic
104(2)
6.7.1 Modes of detection
104(1)
6.7.2 Signature-based detection
104(1)
6.7.3 Other modes of detecting malicious traffic
105(1)
6.8 Signature micro-engines
106(1)
6.9 Severity levels of the signatures
107(1)
6.10 Monitoring and managing alarms and alerts
108(1)
6.11 List of actions to be taken during an attack
108(1)
6.12 Configuration of an IOS IPS
109(2)
6.13 Recommended practices
111(1)
6.14 Exercises for application
112(13)
Chapter 7 Securing a Local Network
125(18)
7.1 Introduction
125(1)
7.2 Types of attacks on Layer 2
126(5)
7.2.1 MAC address flooding attacks
126(1)
7.2.2 MAC spoofing attack
127(1)
7.2.3 The DHCP starvation attack
127(1)
7.2.4 VLAN hopping attacks
128(2)
7.2.5 STP-based attacks
130(1)
7.3 The best security practices for protecting Layer 2
131(1)
7.4 Exercises for application
132(11)
Chapter 8 Cryptography
143(30)
8.1 Basic concepts in cryptography
143(1)
8.1.1 Definition
143(1)
8.1.2 Terminology
144(1)
8.2 The different classifications of cryptology
144(5)
8.2.1 Traditional cryptography
145(1)
8.2.2 Modern cryptography
146(1)
8.2.3 Symmetric and asymmetric encryption
147(2)
8.3 Key management
149(2)
8.3.1 Introduction
149(1)
8.3.2 Diffie-Hellman key exchange
149(2)
8.4 Hash functions
151(1)
8.5 HMAC codes
151(1)
8.6 Asymmetric cryptography
151(8)
8.6.1 Introduction
151(1)
8.6.2 How it works
152(1)
8.6.3 Digital signatures
153(2)
8.6.4 Public key infrastructure
155(4)
8.7 Exercises for application
159(14)
Chapter 9 IPsec VPNs
173(16)
9.1 The IPsec protocol
173(3)
9.1.1 Objectives of IPsec
173(1)
9.1.2 Basic IPsec protocols
174(1)
9.1.3 The IPsec framework
174(1)
9.1.4 The IPsec security association
175(1)
9.1.5 IPsec modes
175(1)
9.2 IKE protocol
176(2)
9.2.1 Introduction
176(1)
9.2.2 Components of IKE
176(1)
9.2.3 IKE phases
176(2)
9.3 The site-to-site VPN configuration
178(3)
9.3.1 Introduction
178(1)
9.3.2 Configuration of IPsec VPN
179(2)
9.4 Exercises for application
181(8)
Chapter 10 Studying Advanced Firewalls
189(54)
10.1 Cisco ASA firewalls
189(9)
10.1.1 Introduction
189(1)
10.1.2 ASA models
190(1)
10.1.3 Modes for using ASA devices
190(1)
10.1.4 An overview of AS A 5505
191(1)
10.1.5 ASA levels of security
192(1)
10.1.6 Configuring an ASA with CLI
193(5)
10.2 Exercises for application
198(12)
10.3 Configuring Cisco elements with graphical tools
210(1)
10.3.1 An overview of the CCP
210(1)
10.3.2 An overview of the ASDM
210(1)
10.3.3 Using CCP and ASDM
210(1)
10.4 The TMG 2010 firewall
211(32)
10.4.1 Introduction
211(1)
10.4.2 Installation and configuration
211(32)
References 243(2)
Index 245
Ali Sadiqui is a trainer-researcher at the Office de la Formation Professionnelle et de la Promotion du Travail (OFPPT), Morocco. He is a member of several research laboratories and obtained his doctorate from the Sidi Mohamed Ben Abdellah University, Morocco.