Network Security Fundamentals

ISBN-10: 1587051672

ISBN-13: 9781587051678

Edition: 2005

Authors: Gert Schauwers, Gert De Laet

List price: $64.99
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detection systems (IDS), remote access security, virtual private networks (VPN), Public Key Infrastructure (PKI), wireless security, and logging and auditing. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies. Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources.
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99
Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $64.99
Copyright year: 2005
Publisher: Cisco Press
Publication date: 9/8/2004
Binding: Paperback
Pages: 480
Size: 7.25" wide x 9.00" long x 1.25" tall
Weight: 1.738
Language: English

Foreword
Introduction
Introduction
Network Security Overview
Defining Trust
Weaknesses and Vulnerabilities
Responsibilities for Network Security
Security Objectives
Conclusion
Q&A
Understanding Vulnerabilities-The Need for Security
Risk and Vulnerability
TCP/IP Suite Weaknesses
Buffer Overflows
Spoofing Techniques
Social Engineering
Conclusion
Q&A
Understanding Defenses
Digital IDs
Intrusion Detection System
PC Card-Based Solutions
Physical Security
Encrypted Login
Firewalls
Reusable Passwords
Antivirus Software
Encrypted Files
Biometrics
Conclusion
Q&A
Building Blocks
Cryptography
Cryptography versus Cryptanalysis
Modern-Day Techniques
Conclusion
Q&A
Security Policies
Defining a Security Policy?
Importance of a Security Policy
Development Process
Incident Handling Process
Security Wheel
Sample Security Policy
Conclusion
Q&A
Secure Design
Network Design-Principles
Network Design-Methodology
Return on Investment
Physical Security Issues
Switches and Hubs
Conclusion
Q&A
Tools and Techniques
Web Security
Hardening
Case Study
Conclusion
Q&A
Router Security
Basic Router Security
Router Security to Protect the Network
CBAC
Case Study
Conclusion
Q&A
References in This Chapter
Firewalls
Firewall Basics
Different Types of Firewalls
Enhancements for Firewalls
Case Study: Placing Filtering Routers and Firewalls
Summary
Q&A
Intrusion Detection System Concepts
Introduction to Intrusion Detection
Host-Based IDSs
Network-Based IDSs
IDS Management Communications-Monitoring the Network
Sensor Maintenance
Case Study: Deployment of IDS Sensors in the Organization and Their Typical Placement
Conclusion
Q&A
Remote Access
AAA Model
AAA Servers
Lock-and-Key Feature
Two-Factor Identification
Case Study: Configuring Secure Remote Access
Summary
Q&A
Virtual Private Networks
Generic Routing Encapsulation Tunnels
IP Security
VPNs with IPSec
Case Study: Remote Access VPN
Conclusion
Q&A
Public Key Infrastructure
Public Key Distribution
Trusted Third Party
PKI Topology
Enrollment Procedure
Revocation Procedure
Case Study: Creating Your Own CA
Conclusion
Q&A
Wireless Security
Different WLAN Configurations
What Is a WLAN?
How Wireless Works
Risks of Open Wireless Ports
War-Driving and War-Chalking
SAFE WLAN Design Techniques and Considerations
Case Study: Adding Wireless Solutions to a Secure Network
Conclusion
Q&A
Logging and Auditing
Logging
SYSLOG
Simple Network Management Protocol
Remote Monitoring
Service Assurance Agent
Case Study
Conclusion
Q&A
Appendixes
SAFE Blueprint
SANS Policies
NSA Guidelines
Answers to Chapter Q&A
Bibliography
Books
Website References
Index
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×