Details

Network Security Bible


Network Security Bible


Bible, Band 657 2. Aufl.

von: Eric Cole

38,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 18.09.2009
ISBN/EAN: 9780470569993
Sprache: englisch
Anzahl Seiten: 944

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>The comprehensive A-to-Z guide on network security, fully revised and updated</p> <p>Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.</p> <p>Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised <i>Network Security Bible</i> complements the Cisco Academy course instruction in networking security.</p> <ul> <li>Covers all core areas of network security and how they interrelate</li> <li>Fully revised to address new techniques, technology, and methods for securing an enterprise worldwide</li> <li>Examines new trends and best practices in use by organizations to secure their enterprises</li> <li>Features additional chapters on areas related to data protection/correlation and forensics</li> <li>Includes cutting-edge topics such as integrated cybersecurity and sections on Security Landscape, with chapters on validating security, data protection, forensics, and attacks and threats</li> </ul> <p>If you need to get up to date or stay current on network security, <i>Network Security Bible, 2nd Edition</i> covers everything you need to know.</p>
<p>Introduction xxxv</p> <p><b>Part I: Network Security Landscape</b></p> <p><b>Chapter 1: State of Network Security 3</b></p> <p>Cyber Security 3</p> <p>Summary 7</p> <p><b>Chapter 2: New Approaches to Cyber Security 9</b></p> <p>General Trends 9</p> <p>The Changing Face of Cyber Security 16</p> <p>Summary 17</p> <p><b>Chapter 3: Interfacing with the Organization 19</b></p> <p>An Enterprise Security Methodology 19</p> <p>Key Questions to Manage Risk 27</p> <p>Summary 32</p> <p><b>Part II: Security Principles and Practices</b></p> <p><b>Chapter 4: Information System Security Principles 35</b></p> <p>Key Principles of Network Security 35</p> <p>Formal Processes 37</p> <p>Risk Management 60</p> <p>Calculating and Managing Risk 70</p> <p>Summary 71</p> <p><b>Chapter 5: Information System Security Management 73</b></p> <p>Security Policies 73</p> <p>Security Awareness 77</p> <p>Managing the Technical Effort 79</p> <p>Configuration Management 87</p> <p>Business Continuity and Disaster Recovery Planning 90</p> <p>Physical Security 98</p> <p>Legal and Liability Issues 105</p> <p>Summary 107</p> <p><b>Chapter 6: Access Control 109</b></p> <p>Control Models 109</p> <p>Types of Access Control Implementations 112</p> <p>Identification and Authentication 115</p> <p>Databases 121</p> <p>Remote Access 123</p> <p>Summary 125</p> <p><b>Chapter 7: Attacks and Threats 127</b></p> <p>Malicious Code 127</p> <p>Review of Common Attacks 129</p> <p>External Attack Methodologies Overview 136</p> <p>Internal Threat Overview 140</p> <p>Summary 142</p> <p><b>Part III: Operating Systems and Applications</b></p> <p><b>Chapter 8: Windows Security 145</b></p> <p>Windows Security at the Heart of the Defense 147</p> <p>Out-of-the-Box Operating System Hardening 151</p> <p>Installing Applications 171</p> <p>Putting the Workstation on the Network 175</p> <p>Operating Windows Safely 177</p> <p>Upgrades and Patches 191</p> <p>Maintain and Test the Security 194</p> <p>Attacks Against the Windows Workstation 198</p> <p>Summary 205</p> <p><b>Chapter 9: UNIX and Linux Security 207</b></p> <p>The Focus of UNIX/Linux Security 207</p> <p>Physical Security 212</p> <p>Controlling the Configuration 217</p> <p>Operating UNIX Safely 224</p> <p>Hardening UNIX 245</p> <p>Summary 253</p> <p><b>Chapter 10: Web Browser and Client Security 255</b></p> <p>Web Browser and Client Risk 255</p> <p>How a Web Browser Works 259</p> <p>Web Browser Attacks 268</p> <p>Operating Safely 271</p> <p>Web Browser Configurations 276</p> <p>Summary 286</p> <p><b>Chapter 11: Web Security 287</b></p> <p>What Is HTTP? 287</p> <p>How Does HTTP Work? 289</p> <p>Server Content 301</p> <p>Client Content 303</p> <p>State 309</p> <p>Attacking Web Servers 315</p> <p>Web Services 317</p> <p>Summary 321</p> <p><b>Chapter 12: Electronic mail (E-mail) Security 323</b></p> <p>The E-mail Risk 323</p> <p>The E-mail Protocols 340</p> <p>E-mail Authentication 345</p> <p>Operating Safely When Using E-mail 348</p> <p>Summary 355</p> <p><b>Chapter 13: Domain Name System 357</b></p> <p>DNS Basics 358</p> <p>Purpose of DNS 364</p> <p>Setting Up DNS 375</p> <p>Security Issues with DNS 377</p> <p>DNS Attacks 384</p> <p>Designing DNS 386</p> <p>Master Slave DNS 388</p> <p>Detailed DNS Architecture 388</p> <p>DNS SEC 389</p> <p>Summary 393</p> <p><b>Chapter 14: Server Security 395</b></p> <p>General Server Risks 395</p> <p>Security by Design 396</p> <p>Operating Servers Safely 413</p> <p>Server Applications 417</p> <p>Multi-Level Security and Digital Rights Management 421</p> <p>Summary 427</p> <p><b>Part IV: Network Security Fundamentals</b></p> <p><b>Chapter 15: Network Protocols 431</b></p> <p>Protocols 431</p> <p>The Open Systems Interconnect Model 432</p> <p>The OSI Layers 433</p> <p>The TCP/IP Model 439</p> <p>TCP/IP Model Layers 441</p> <p>Internet Protocol 442</p> <p>VoIP 450</p> <p>Summary 457</p> <p><b>Chapter 16: Wireless Security 459</b></p> <p>Electromagnetic Spectrum 459</p> <p>The Cellular Phone Network 462</p> <p>Placing a Cellular Telephone Call 464</p> <p>Wireless Transmission Systems 469</p> <p>Pervasive Wireless Data Network Technologies 473</p> <p>IEEE Wireless LAN Specifications 478</p> <p>IEEE 802.11 480</p> <p>IEEE 802.11 Wireless Security 485</p> <p>Bluetooth 503</p> <p>Wireless Application Protocol 504</p> <p>Future of Wireless 506</p> <p>Summary 508</p> <p><b>Chapter 17: Network Architecture Fundamentals 509</b></p> <p>Network Segments 510</p> <p>Perimeter Defense 511</p> <p>Network Address Translation 511</p> <p>Basic Architecture Issues 513</p> <p>Subnetting, Switching, and VLANs 516</p> <p>Address Resolution Protocol and Media Access Control 517</p> <p>Dynamic Host Configuration Protocol and Addressing Control 518</p> <p>Zero Configuration Networks 519</p> <p>System Design and Architecture Against Insider Threats 525</p> <p>Common Attacks 528</p> <p>Summary 529</p> <p><b>Chapter 18: Firewalls 531</b></p> <p>Firewalls 531</p> <p>Firewall Rules 537</p> <p>The Use of Personal Firewalls 542</p> <p>Summary 548</p> <p><b>Chapter 19: Intrusion Detection/Prevention 549</b></p> <p>Intrusion Detection Systems 549</p> <p>Responses to Intrusion Detection 556</p> <p>Emerging Technologies in Intrusion Detection Systems 556</p> <p>Summary 567</p> <p><b>Part V: Communication</b></p> <p><b>Chapter 20: Secret Communication 571</b></p> <p>What is Cryptography? 572</p> <p>General Terms 576</p> <p>Principles of Cryptography 577</p> <p>The Four Cryptographic Primitives 587</p> <p>Putting These Primitives Together to Achieve CIA 602</p> <p>The Difference Between Algorithm and Implementation 603</p> <p>Proprietary Versus Open Source Algorithms 606</p> <p>Attacks on Hash Functions 607</p> <p>Quantum Cryptography 617</p> <p>Summary 628</p> <p><b>Chapter 21: Covert Communication 631</b></p> <p>Where Hidden Data Hides 631</p> <p>Where Did It Come From? 633</p> <p>Where Is It Going? 633</p> <p>Overview of Steganography 634</p> <p>History of Steganography 639</p> <p>Core Areas of Network Security and Their Relation to Steganography 641</p> <p>Principles of Steganography 643</p> <p>Steganography Compared to Cryptography 644</p> <p>Types of Steganography 646</p> <p>Products That Implement Steganography 654</p> <p>Steganography Versus Digital Watermarking 673</p> <p>Types of Digital Watermarking 675</p> <p>Goals of Digital Watermarking 676</p> <p>Digital Watermarking and Stego 676</p> <p>Summary 679</p> <p><b>Chapter 22: Applications of Secure/Covert Communication 681</b></p> <p>E-mail 682</p> <p>Authentication Servers 685</p> <p>Working Model 686</p> <p>Public Key Infrastructure 688</p> <p>Virtual Private Networks 692</p> <p>Secure Sockets Layer/Transport Layer Security 699</p> <p>SSL Handshake 700</p> <p>Summary 704</p> <p><b>Part VI: The Security Threat and Response</b></p> <p><b>Chapter 23: Intrusion Detection and Response 707</b></p> <p>Intrusion Detection Mechanisms 707</p> <p>Honeypots 712</p> <p>Incident Handling 716</p> <p>Summary 727</p> <p><b>Chapter 24: Digital Forensics 729</b></p> <p>Computer Forensics Defined 730</p> <p>Traditional Computer Forensics 730</p> <p>Proactive Forensics 746</p> <p>Future Research Areas 748</p> <p>The Forensic Life Cycle 750</p> <p>Summary 750</p> <p><b>Chapter 25: Security Assessments, Testing, and Evaluation 751</b></p> <p>Information Assurance Approaches and Methodologies 751</p> <p>Certification and Accreditation 756</p> <p>Diacap 760</p> <p>Federal Information Processing Standard 102 763</p> <p>OMB Circular A-130 764</p> <p>The National Institute of Standards and Technology Assessment Guidelines 765</p> <p>Penetration Testing 770</p> <p>Auditing and Monitoring 772</p> <p>Summary 774</p> <p><b>Part VII: Integrated Cyber Security</b></p> <p><b>Chapter 26: Validating Your Security 777</b></p> <p>Overview 777</p> <p>Current State of Penetration Testing 780</p> <p>Formal Penetration Testing Methodology 783</p> <p>Steps to Exploiting a System 787</p> <p>Summary 795</p> <p><b>Chapter 27: Data Protection 797</b></p> <p>Endpoint Security 799</p> <p>Insider Threats and Data Protection 805</p> <p>Summary 806</p> <p><b>Chapter 28: Putting Everything Together 809</b></p> <p>Critical Problems Facing Organizations 809</p> <p>General Tips for Protecting a Site 815</p> <p>Security Best Practices 819</p> <p>Summary 834</p> <p><b>Chapter 29: The Future 835</b></p> <p>Approaching the Problem 835</p> <p>Mission Resilience 837</p> <p>Limiting Failure Points 844</p> <p>Summary 847</p> <p>Index 849</p>
<p>Eric Cole holds a PhD and CISSP and has been a security consultant for international banks and the Fortune 500. He made his mark working for the CIA for more than seven years and as a member of the Honeynet Project. He was also a member of the Commission on Cyber Security for the 44th Presidency. He has appeared as a security expert on CBS News and 60 Minutes and is a regular security expert for CNN Headline News. </p>
<p>Complements your Cisco Academy course instruction in networking security!</p> <p>Network Security Bible</p> <p>Second Edition</p> <p>Eric Cole</p> <p>Understand the changing security landscape</p> <p>Learn the latest approaches and best practices</p> <p>Secure your enterprise and data worldwide</p> <p>The book you need to succeed!</p> <p>If you're in charge of network security, you need this book</p> <p>Since the first edition of this comprehensive guide, cyber threats have increased, the stakes have gotten higher, and what is considered state of the art security has evolved. This packed new edition, thoroughly revised to cover the very latest techniques, is the detailed wall-to-wall resource you need to keep your network secure. Understand the changing threats, find out what defense in depth means and why you need it, learn best practices, and take control with this must-have book.</p> <ul> <li> <p>Understand current threats and attacks and how they succeed</p> </li> <li> <p>Answer 30 critical questions and see how your network security is today</p> </li> <li> <p>Consider mission resilience and make sure your critical functions survive</p> </li> <li> <p>Master crypto, steganography, VPN, and other covert communications</p> </li> <li> <p>Learn effective techniques for Windows®, Linux®, browser, e-mail, and wireless security</p> </li> <li> <p>Explore the basics of digital forensics, including evidence preservation</p> </li> <li> <p>Do risk analysis, make a global plan, and prepare for business continuity and recovery</p> </li> </ul>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €