Muutke küpsiste eelistusi

Network Security, Firewalls, and VPNs 2 PCK PAP/ [Kõva köide]

  • Formaat: Hardback, 488 pages, kõrgus x laius x paksus: 279x216x32 mm, kaal: 635 g
  • Ilmumisaeg: 24-Jul-2014
  • Kirjastus: Ingram
  • ISBN-10: 1284074374
  • ISBN-13: 9781284074376
  • Kõva köide
  • Hind: 220,32 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 488 pages, kõrgus x laius x paksus: 279x216x32 mm, kaal: 635 g
  • Ilmumisaeg: 24-Jul-2014
  • Kirjastus: Ingram
  • ISBN-10: 1284074374
  • ISBN-13: 9781284074376
Preface xiii
PART ONE Foundations of Network Security
1(148)
Chapter 1 Fundamentals of Network Security
2(41)
What Is Network Security?
4(3)
What Is Trust?
4(2)
Who---or What---Is Trustworthy?
6(1)
What Are Security Objectives?
6(1)
What Are You Trying to Protect?
7(3)
Seven Domains of a Typical IT Infrastructure
9(1)
Goals of Network Security
10(1)
How Can You Measure the Success of Network Security?
10(1)
Why Are Written Network Security Policies Important?
11(1)
Planning for the Worst
11(1)
Who Is Responsible for Network Security?
12(1)
Examples of Network Infrastructures and Related Security Concerns
13(8)
Workgroups
13(2)
SOHO Networks
15(1)
Client/Server Networks
15(1)
LAN Versus WAN
16(1)
Thin Clients and Terminal Services
17(1)
Remote Control, Remote Access, and VPN
17(2)
Boundary Networks
19(1)
Strengths and Weaknesses of Network Design
20(1)
Enhancing the Security of Wired Versus Wireless LAN Infrastructures
21(1)
Internal and External Network Issues
22(2)
Common Network Security Components Used to Mitigate Threats
24(19)
Hosts and Nodes
24(1)
IPv4 Versus IPv6
25(2)
Firewall
27(1)
Virtual Private Networks
28(1)
Proxy Servers
28(1)
Network Address Translation
29(3)
Routers, Switches, and Bridges
32(4)
The Domain Name System
36(1)
Directory Services
37(1)
Intrusion Detection Systems and Intrusion Prevention Systems
37(1)
Network Access Control
38(1)
Chapter Summary
39(1)
Key Concepts And Terms
39(1)
Chapter 1 Assessment
40(3)
Chapter 2 Firewall Fundamentals
43(36)
What Is a Firewall?
44(8)
What Firewalls Cannot Do
47(5)
Why Do You Need a Firewall?
52(4)
What Are Zones of Risk?
56(1)
How Firewalls Work and What Firewalls Do
57(4)
TCP/IP Basics
61(5)
OSI Reference Model
62(2)
Sub-Protocols
64(1)
Headers and Payloads
64(1)
Addressing
65(1)
Types of Firewalls
66(2)
Ingress and Egress Filtering
68(1)
Types of Filtering
69(3)
Static Packet Filtering
69(1)
Stateful Inspection and Dynamic Packet Filtering
69(1)
Network Address Translation (NAT)
70(1)
Application Proxy
70(1)
Circuit Proxy
71(1)
Content Filtering
72(1)
Software Versus Hardware Firewalls
72(1)
IPv4 Versus IPv6 Firewalls
73(1)
Dual-Homed and Triple-Homed Firewalls
73(1)
Placement of Firewalls
74(5)
Chapter Summary
75(1)
Key Concepts And Terms
75(1)
Chapter 2 Assessment
76(3)
Chapter 3 VPN Fundamentals
79(32)
What Is a Virtual Private Network?
80(5)
What Are the Benefits of Deploying a VPN?
85(2)
What Are the Limitations of a VPN?
87(7)
What Are Effective VPN Policies?
89(1)
VPN Deployment Models and Architecture
89(5)
Tunnel Versus Transport Mode
94(1)
The Relationship Between Encryption and VPNs
94(10)
Symmetric Cryptography
95(1)
Asymmetric Cryptography
96(4)
Hashing
100(4)
What Is VPN Authentication?
104(1)
VPN Authorization
105(6)
Chapter Summary
107(1)
Key Concepts And Terms
107(1)
Chapter 3 Assessment
108(3)
Chapter 4 Network Security Threats and Issues
111(38)
Hacker Motivation
113(1)
Favorite Targets of Hackers
114(2)
Threats from Internal Personnel and External Entities
116(9)
The Hacking Process
119(6)
Fallback Attacks
125(1)
Common IT Infrastructure Threats
125(2)
Hardware Failures and Other Physical Threats
125(1)
Natural Disasters
126(1)
Accidents and Intentional Concerns
127(1)
Malicious Code (Malware)
127(3)
Advanced Persistent Threat
130(1)
Fast Growth and Overuse
130(1)
Wireless Versus Wired
131(1)
Eavesdropping
132(1)
Replay Attacks
132(1)
Insertion Attacks
133(1)
Fragmentation Attacks, Buffer Overflows, and XSS Attacks
134(1)
Fragmentation Attacks
134(1)
Buffer Overflows
135(1)
XSS (Cross-Site Scripting) Attacks
135(1)
Man-in-the-Middle, Session Hijacking, and Spoofing Attacks
135(4)
Man-in-the-Middle Attacks
135(2)
Session Hijacking
137(1)
Spoofing Attacks
138(1)
Covert Channels
139(2)
Network and Resource Availability Threats
141(1)
Denial of Service (DoS)
141(1)
Distributed Denial of Service (DDoS)
142(1)
Hacker Tools
143(1)
Social Engineering
144(5)
Chapter Summary
145(1)
Key Concepts And Terms
146(1)
Chapter 4 Assessment
147(2)
PART TWO Technical Overview of Network Security, Firewalls, and VPNs
149(224)
Chapter 5 Network Security Implementation
150(31)
Seven Domains of a Typical IT Infrastructure
151(2)
Network Design and Defense in Depth
153(4)
Protocols
157(2)
Common Types of Addressing
159(2)
IPv6
161(1)
Controlling Communication Pathways
161(4)
Hardening Systems
165(1)
Equipment Selection
166(2)
Authentication, Authorization, and Accounting
168(2)
Communication Encryption
170(1)
Hosts: Local-Only or Remote and Mobile
171(1)
Redundancy
172(1)
Endpoint Security
173(8)
Clients
173(1)
Servers
174(1)
Routers
174(1)
Switches
175(1)
Firewalls and Proxies
176(2)
Chapter Summary
178(1)
Key Concepts And Terms
178(1)
Chapter 5 Assessment
179(2)
Chapter 6 Network Security Management
181(31)
Network Security Management Best Practices
182(7)
Fail-Secure, Fail-Open, and Fail-Close Options
189(1)
Physical Security
190(1)
Watching for Compromise
191(1)
Incident Response
191(1)
Trapping Intruders and Violators
191(1)
Why Containment Is Important
192(1)
Imposing Compartmentalization
192(1)
Using Honeypots, Honeynets, and Padded Cells
193(1)
Essential Host Security Controls
193(2)
Backup and Recovery
195(1)
User Training and Awareness
196(3)
Network Security Management Tools
199(1)
Security Checklist
200(2)
Network Security Troubleshooting
202(2)
Compliance Auditing
204(1)
Security Assessment
205(1)
Configuration Scans
206(1)
Vulnerability Scanning
207(1)
Penetration Testing
207(1)
Post-Mortem Assessment Review
208(4)
Chapter Summary
209(1)
Key Concepts And Terms
209(1)
Chapter 6 Assessment
210(2)
Chapter 7 Firewall Basics
212(35)
Firewall Rules
213(10)
Authentication, Authorization, and Accounting
223(3)
Monitoring and Logging
226(2)
Understanding and Interpreting Firewall Logs and Alerts
228(4)
Intrusion Detection
232(1)
Limitations of Firewalls
233(3)
Improving Performance
236(2)
The Downside of Encryption with Firewalls
238(1)
Firewall Enhancements
239(2)
Management Interfaces
241(6)
Chapter Summary
244(1)
Key Concepts And Terms
244(1)
Chapter 7 Assessment
245(2)
Chapter 8 Firewall Deployment Considerations
247(27)
What Should You Allow and What Should You Block?
248(3)
Common Security Strategies for Firewall Deployments
251(8)
Security Through Obscurity
251(1)
Least Privilege
252(1)
Simplicity
253(1)
Defense in Depth
254(1)
Diversity of Defense
255(2)
Chokepoint
257(1)
Weakest Link
257(1)
Fail-Safe
258(1)
Forced Universal Participation
258(1)
Essential Elements of a Firewall Policy
259(2)
Software and Hardware Options for Firewalls
261(1)
Benefit and Purpose of Reverse Proxy
262(1)
Use and Benefit of Port-Forwarding
263(1)
Considerations for Selecting a Bastion Host OS
263(2)
Constructing and Ordering Firewall Rules
265(1)
Evaluating Needs and Solutions in Designing Security
266(2)
What Happens When Security Gets in the Way of Doing Business?
268(6)
Chapter Summary
270(1)
Key Concepts And Terms
270(1)
Chapter 8 Assessment
271(3)
Chapter 9 Firewall Management and Security
274(26)
Best Practices for Firewall Management
275(4)
Security Measures in Addition to a Firewall
279(2)
Selecting the Right Firewall for Your Needs
281(1)
The Difference Between Buying and Building a Firewall
282(1)
Mitigating Firewall Threats and Exploits
283(4)
Concerns Related to Tunneling Through or Across a Firewall
287(2)
Testing Firewall Security
289(1)
Important Tools for Managing and Monitoring a Firewall
290(2)
Troubleshooting Firewalls
292(3)
Proper Firewall Implementation Procedure
295(1)
Responding to Incidents
296(4)
Chapter Summary
297(1)
Key Concepts And Terms
297(1)
Chapter 9 Assessment
297(3)
Chapter 10 Using Common Firewalls
300(22)
Individual and Small Office/Home Office (SOHO) Firewall Options
301(4)
Uses for a Host Software Firewall
305(2)
Examples of Software Firewall Products
306(1)
Using Windows 7's Host Software Firewall
307(2)
Using a Linux Host Software Firewall
309(1)
Managing the Firewall on an ISP Connection Device
310(5)
Converting a Home Router into a Firewall
311(4)
Commercial Software Network Firewalls
315(1)
Open-Source Software Network Firewalls
315(1)
Appliance Firewalls
316(2)
Virtual Firewalls
318(1)
Simple Firewall Techniques
318(4)
Chapter Summary
319(1)
Key Concepts And Terms
320(1)
Chapter 10 Assessment
320(2)
Chapter 11 VPN Management
322(29)
VPN Management Best Practices
323(5)
Developing a VPN Policy
328(2)
Developing a VPN Deployment Plan
330(5)
Bypass Deployment
331(1)
Internally Connected Deployment
332(1)
DMZ-Based Implementation
332(3)
VPN Threats and Exploits
335(5)
Commercial or Open Source VPNs
340(1)
Differences Between Personal and Enterprise VPNs
340(1)
Balancing Anonymity and Privacy
341(1)
Protecting VPN Security to Support Availability
341(1)
The Importance of User Training
342(1)
VPN Troubleshooting
343(8)
Chapter Summary
348(1)
Key Concepts And Terms
348(1)
Chapter 11 Assessment
349(2)
Chapter 12 VPN Technologies
351(22)
Differences Between Software and Hardware Solutions
352(2)
Software VPNs
353(1)
Hardware VPNs
353(1)
Differences Between Layer 2 and Layer 3 VPNs
354(1)
Internet Protocol Security (IPSec)
355(2)
Layer 2 Tunneling Protocol (L2TP)
357(1)
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
358(3)
SSL/TLS and VPNs
360(1)
Secure Shell (SSH) Protocol
361(1)
Establishing Performance and Stability for VPNs
362(2)
Performance
362(2)
Stability
364(1)
Using VPNs with Network Address Translation (NAT)
364(2)
Types of Virtualization
366(2)
Desktop Virtualization
366(1)
SSL VPN Virtualization
367(1)
Differences Between Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
368(5)
The TCP/IP Protocol Suite
368(1)
IPv4 Challenges
368(1)
IPv6
369(1)
IPSec and IPv6
370(1)
Chapter Summary
370(1)
Key Concepts And Terms
371(1)
Chapter 12 Assessment
371(2)
PART THREE Implementation, Resources, and the Future
373(68)
Chapter 13 Firewall Implementation
374(20)
Constructing, Configuring, and Managing a Firewall
375(1)
SmoothWall
375(2)
Examining Your Network and Its Security Needs
377(7)
What to Protect and Why
377(2)
Preserving Privacy
379(1)
Firewall Design and Implementation Guidelines
380(3)
Selecting a Firewall
383(1)
Hardware Requirements for SmoothWall
384(1)
Planning a Firewall Implementation with SmoothWall
384(2)
Firewalling a Big Organization: Application-Level Firewall and Package Filtering, a Hybrid System
385(1)
Firewalling a Small Organization: Packet Filtering or Application-Level Firewall, a Proxy Implementation
385(1)
Firewalling in a Subnet Architecture
386(1)
Installing a Firewall with SmoothWall
386(1)
Configuring a Firewall with SmoothWall
387(1)
Elements of Firewall Deployment
388(1)
Performing Testing with SmoothWall
388(1)
Firewall Troubleshooting
389(1)
Additional SmoothWall Features
390(1)
Firewall Implementation Best Practices
390(4)
Chapter Summary
391(1)
Key Concepts And Terms
392(1)
Chapter 13 Assessment
392(2)
Chapter 14 Real-World VPNs
394(24)
Operating System---Based VPNs
395(3)
VPN Appliances
398(1)
Configuring a Typical VPN Appliance
399(1)
Client-Side Configuration
399(1)
Remote Desktop Protocol
399(1)
Using Remote Control Tools
400(1)
Using Remote Access
401(2)
The Technology for Remote Use
401(1)
Choosing Between IPSec and SSL Remote Access VPNs
402(1)
Terminal Services
403(1)
TS RemoteApp
404(1)
TS Web Access
404(1)
Microsoft DirectAccess
404(1)
DMZ, Extranet, and Intranet VPN Solutions
405(2)
Intranet VPNs
405(1)
Extranet VPNs
406(1)
Internet Cafe VPNs
407(1)
Online Remote VPN Options
407(1)
Security
407(1)
Wake-on-LAN Support
408(1)
File Sharing
408(1)
Remote Printing
408(1)
Mac Support
408(1)
The Tor Application
408(1)
Planning a VPN Implementation
409(6)
Requirements
410(1)
Installation
411(1)
Deployment
412(1)
Testing and Troubleshooting
413(2)
VPN Implementation Best Practices
415(3)
Chapter Summary
415(1)
Key Concepts And Terms
416(1)
Chapter 14 Assessment
416(2)
Chapter 15 Perspectives, Resources, and the Future
418(23)
What the Future Holds for Network Security, Firewalls, and VPNs
419(5)
Threats
420(1)
Firewall Capabilities
421(1)
Encryption
421(1)
Authentication
421(1)
Metrics
422(1)
Focus
422(1)
Securing the Cloud
423(1)
Securing Mobile Devices
423(1)
Mobile IP
424(1)
Bring Your Own Device (BYOD)
424(1)
Resource Sites for Network Security, Firewalls, and VPNs
424(1)
Tools for Network Security, Firewalls, and VPNs
425(1)
Commercial Off-the-Shelf (COTS) Software
425(1)
Open Source Applications and Tools
426(1)
The Impact of Ubiquitous Wireless Connectivity
426(2)
Potential Uses of Security Technologies
428(3)
What Happens When There Is No Perimeter?
430(1)
Specialized Firewalls Available
431(3)
Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)
432(2)
Effect of Honeypots, Honeynets, and Padded Cells
434(1)
Emerging Network Security Technologies
435(6)
IP Version 6
435(1)
VPNs, Firewalls, and Virtualization
436(1)
Steganography
437(1)
Anti-Forensics
437(1)
Chapter Summary
438(1)
Key Concepts And Terms
439(1)
Chapter 15 Assessment
439(2)
Appendix A Answer Key 441(2)
Appendix B Standard Acronyms 443(2)
Glossary of Key Terms 445(26)
References 471(4)
Index 475