Skip to content

End-to-End Network Security Defense-in-Depth

Best in textbook rentals since 2012!

ISBN-10: 1587053322

ISBN-13: 9781587053320

Edition: 2008

Authors: Omar Santos

List price: $64.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

"End-to-End Network Security" "Defense-in-Depth" Best practices for assessing and improving network defenses and responding to security incidents Omar Santos Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity-all blurring the boundaries between the network and perimeter. "End-to-End Network Security" is designed to counter the new generation of complex threats. Adopting this robust security strategy…    
Customers also bought

Book details

List price: $64.99
Copyright year: 2008
Publisher: Cisco Press
Publication date: 8/24/2007
Binding: Paperback
Pages: 480
Size: 7.25" wide x 9.00" long x 1.00" tall
Weight: 1.738
Language: English

Foreword
Introduction
Introduction to Network Security Solutions
Firewalls
Network Firewalls
Network Address Translation (NAT)
Stateful Firewalls
Deep Packet Inspection
Demilitarized Zones
Personal Firewalls
Virtual Private Networks (VPN)
Technical Overview of IPsec
Phase 1
Phase 2
SSL VPNs
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
Pattern Matching
Protocol Analysis
Heuristic-Based Analysis
Anomaly-Based Analysis
Anomaly Detection Systems
Authentication, Authorization, and Accounting (AAA) and Identity Management
RADIUS
TACACS+
Identity Management Concepts
Network Admission Control
NAC Appliance
NAC Framework
Routing Mechanisms as Security Tools
Summary
Security Lifestyle: Frameworks and Methodologies
Preparation Phase
Risk Analysis
Threat Modeling
Penetration Testing
Social Engineering
Security Intelligence
Common Vulnerability Scoring System
Base Metrics
Temporal Metrics
Environmental Metrics
Creating a Computer Security Incident Response Team (CSIRT)
Who Should Be Part of the CSIRT?
Incident Response Collaborative Teams
Tasks and Responsibilities of the CSIRT
Building Strong Security Policies
Infrastructure Protection
Strong Device Access Control
SSH Versus Telnet
Local Password Management
Configuring Authentication Banners
Interactive Access Control
Role-Based Command-Line Interface (CLI) Access in Cisco IOS
Controlling SNMP Access
Securing Routing Protocols
Configuring Static Routing Peers
Authentication
Route Filtering
Time-to-Live (TTL) Security Check
Disabling Unnecessary Services on Network Components
Cisco Discovery Protocol (CDP)
Finger