Skip to content

Network Security Architectures

Best in textbook rentals since 2012!

ISBN-10: 158705115X

ISBN-13: 9781587051159

Edition: 2nd 2004

Authors: Sean Convery

List price: $65.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Network Security Architectures offers a comprehensive how-to guide to understanding and implementing the Cisco security blueprint. Written by the two authors of the Cisco Systems SAFE blueprint, it taps into the design strategies of the experts from Cisco. The book begins by discussing the whys and hows of security, identifying relevant lifecycle models and showing the history behind current architectures. Part II provides a broad overview of all of the important security considerations and moving parts to implementing a security plan, itemizing security threats, and listing the elements of security in a network systems. One chapter is dedicated to the concept of device hardening--an…    
Customers also bought

Book details

List price: $65.00
Edition: 2nd
Copyright year: 2004
Publisher: Cisco Press
Publication date: 4/19/2004
Binding: Hardcover
Pages: 792
Size: 7.50" wide x 9.25" long x 2.00" tall
Weight: 3.278
Language: English

Foreword
Preface
Network Security Foundations
Network Security Axioms
Network Security Is a System
Business Priorities Must Come First
Network Security Promotes Good Network Design
Everything Is a Target
Everything Is a Weapon
Strive for Operational Simplicity
Good Network Security Is Predictable
Avoid Security Through Obscurity
Confidentiality and Security Are Not the Same
Summary
Reference
Applied Knowledge Questions
Security Policy and Operations Life Cycle
You Can't Buy Network Security
What Is a Security Policy? Security System Development and Operations Overview
Summary
References
Applied Knowledge Questions
Secure Networking Threats
The Attack Process
Attacker Types
Vulnerability Types
Attack Results
Attack Taxonomy
Summary
References
Applied Knowledge Questions
Network Security Technologies
The Difficulties of Secure Networking
Security Technologies
Emerging Security Technologies
Summary
References
Applied Knowledge Questions
Designing Secure Networks
Device Hardening
Components of a Hardening Strategy
Network Devices
Host Operating Systems
Applications
Appliance-Based Network Services
Rogue Device Detection
Summary
References
Applied Knowledge Questions
General Design Considerations
Physical Security Issues
Layer 2 Security Considerations
IP Addressing Design Considerations
ICMP Design Considerations
Routing Considerations
Transport Protocol Design Considerations
DoS Design Considerations
Summary
References
Applied Knowledge Questions
Network Security Platform Options and Best Deployment Practices
Network Security Platform Options
Network Security Device Best Practices
Summary
Reference
Applied Knowledge Questions
Common Application Design Considerations
E-Mail
DNS. HTTP/HTTPS. FTP. Instant Messaging
Application Evaluation
Summary
References
Applied Knowledge Questions
Identity Design Considerations
Basic Foundation Identity Concepts
Types of Identity
Factors in Identity
Role of Identity in Secure Networking
Identity Technology Guidelines
Identity Deployment Recommendations
Summary
References
Applied Knowledge Questions
IPsec VPN Design Considerations
VPN Basics
Types of IPsec VPNs
IPsec Modes of Operation and Security Options
Topology Considerations
Design Considerations
Site-to-Site Deployment Examples
IPsec Outsourcing
Summary
References
Applied Knowledge Questions
Supporting-Technology Design Considerations
Content
Load Balancing
Wireless LANs
IP Telephony
Summary
References
Applied Knowledge Questions
Designing Your Security System
Network Design Refresher
Security System Concepts
Impact of Network Security on the Entire Design
Ten Steps to Designing Your Security System
Summary
Applied Knowledge Questio