Amazon cover image
Image from Amazon.com

How to cheat at securing your network / [Ido Dubrawksy, technical editor].

Contributor(s): Material type: TextTextSeries: "How to cheat--"Publication details: Burlington, MA : Syngress, ©2007.Description: 1 online resource (xix, 409 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780080558646
  • 008055864X
  • 9781597492317
  • 1597492310
Other title:
  • Securing your network
Subject(s): Genre/Form: Additional physical formats: Print version:: How to cheat at securing your network.DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .H684 2007eb
Online resources:
Contents:
Front Cover; How to Cheat at Securing Your Network; Copyright Page; Contents; Chapter 1. General Security Concepts: Access Control, Authentication, and Auditing; Introduction to AAA; Access Control; Authentication; Auditing; Disabling Non-essential Services, Protocols, Systems and Processes; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. General Security Concepts: Attacks; Attacks; Active Attacks; Social Engineering; Vulnerability Scanning; Passive Attacks; Password Attacks; Malicious Code Attacks; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 3. Communication Security: Remote Access and MessagingIntroduction; The Need for Communication Security; Remote Access Security; E-mail Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Communication Security: Wireless; Introduction; Wireless Concepts; Wireless Vulnerabilities; Site Surveys; Implementing Wireless Security: Common Best Practices; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Communication Security: Web Based Services; Introduction; Web Security; FTP Security; Directory Services and LDAP Security; Summary
Solutions Fast TrackFrequently Asked Questions; Chapter 6. Infrastructure Security: Devices and Media; Introduction; Device-based Security; Media-based Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Topologies and IDS; Introduction; Security Topologies; Intrusion Detection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Infrastructure Security: System Hardening; Introduction; Concepts and Processes of OS and NOS Hardening; Network Hardening; Application Hardening; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 9. Basics of CryptographyIntroduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Public Key Infrastructure; Introduction; PKI; Key Management and Certificate Lifecycle; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Summary: Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integritSummary: Printbegrænsninger: Der kan printes kapitelvis.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Print version record.

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit

Printbegrænsninger: Der kan printes kapitelvis.

Front Cover; How to Cheat at Securing Your Network; Copyright Page; Contents; Chapter 1. General Security Concepts: Access Control, Authentication, and Auditing; Introduction to AAA; Access Control; Authentication; Auditing; Disabling Non-essential Services, Protocols, Systems and Processes; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. General Security Concepts: Attacks; Attacks; Active Attacks; Social Engineering; Vulnerability Scanning; Passive Attacks; Password Attacks; Malicious Code Attacks; Summary; Solutions Fast Track; Frequently Asked Questions

Chapter 3. Communication Security: Remote Access and MessagingIntroduction; The Need for Communication Security; Remote Access Security; E-mail Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Communication Security: Wireless; Introduction; Wireless Concepts; Wireless Vulnerabilities; Site Surveys; Implementing Wireless Security: Common Best Practices; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Communication Security: Web Based Services; Introduction; Web Security; FTP Security; Directory Services and LDAP Security; Summary

Solutions Fast TrackFrequently Asked Questions; Chapter 6. Infrastructure Security: Devices and Media; Introduction; Device-based Security; Media-based Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Topologies and IDS; Introduction; Security Topologies; Intrusion Detection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Infrastructure Security: System Hardening; Introduction; Concepts and Processes of OS and NOS Hardening; Network Hardening; Application Hardening; Summary; Solutions Fast Track; Frequently Asked Questions

Chapter 9. Basics of CryptographyIntroduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Public Key Infrastructure; Introduction; PKI; Key Management and Certificate Lifecycle; Summary; Solutions Fast Track; Frequently Asked Questions; Index

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library