Résumé
With the rise of eBusiness, the number and destructiveness of network attacks have increased. Melissa, the Love Bug, Nimda, and Reezak all caught the eBusiness community unprepared, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's Internet-based economy.
Enterprise Security is a comprehensive handbook on the state-of-the-art in eBusiness security. It examines the most recent attack strategies and offers specific technologies and techniques for combating attempts at data infiltration, destruction, and denial of service attacks. Taking the view that security must be incorporated within multiple levels of eBusiness technology and practice, the book presents measures for securing your system platform, applications, operating environment, processes, and communication links. It shows how the traditional security technologies of firewalls and Virtual Private Networks (VPNs) can be integrated with risk management, vulnerability assessment, intrusion detection, and content management for a comprehensive approach to security.
You will find in-depth coverage of such topics as:
- The goals and sophisticated tools of today's hackers
- The advantages and shortcomings of firewalls and VPNs
- Incorporating security into application development
- Attacks against TCP/IP, including SYN Flood and Land attacks
- Distributed denial of service (DDoS) attacks and strategies to combat them
- ICMP directed broadcast and Smurf bandwidth attacks
- The Bubble Boy virus
- JavaScript attacks
- AddTCP Wrappers and security in layers
- Guidelines for vulnerability assessment and risk management
Several informative appendices enumerate the top 20 enterprise vulnerabilities, provide an incident response form, discuss how to harden the often-targeted Windows 2000 operating system, and examine denial of service attacks in-depth.
Featuring the latest in attack technology and defenses, this book is an invaluable resource for IT managers and professionals who must remain a step ahead of the enemy in the ongoing security arms race.
Contents
I. THE FORGING OF A NEW ECONOMY.
1. What is eBusiness?
2. What is eSecurity?
3. The malicious opponents of eBusiness: Marauders or just
Cyberpunks?
II. CYBERWAR I: PROTECTING INFORMATION ASSETS IN AN OPEN SOCIETY.
4. A new theater of battle.
5. Re-empowering IT in the new arms race.
III. CYBERWAR II: CONTROL FOR CYBERSPACE.
6. Hacker and cracker tools: conducting a campaign of
war.
7. Other attack classes and exploited
vulnerabilities.
8. Countermeasures and attack prevention.
9. Coping with Denial of Service (DoS) Attacks.
10. Architecture, countermeasures and strategies for the
“White Hats, Part I” .
11. Architecture, countermeasures and strategies for the
“White Hats, Part II” .
IV. THE SECURE EBUSINESS PROCESS.
12. Vulnerability management.
13. Risk management.
V. APPENDIXES.
Appendix A. Sans Institute Top Twenty
Vulnerabilities.
Appendix B. Sample CERT/CC Incident Response form.
Appendix C. Hardening the Windows 2000 Operating
System.
Appendix D. Denial of Service attacks. in depth
descriptions.
Glossary.
Index.
L'auteur - David Leon Clark
David Leon Clark has over twenty years of experience in information technology systems and solutions and is currently the program manager responsible for the Information Assurance practice of Acton Burnell, Inc. of Alexandria, Virginia. Mr. Clark provides advice, support, and life cycle security consulting to federal and commercial clients. He designed the core curriculum for the Information Security Management (ISM) course of study, a graduate level program for the University of Virginia's School of Continuing and Professional Studies. A professional writer on high-tech topics, he is the author of IT Manager's Guide to Virtual Private Networks, along with numerous technology white papers and marketing literature
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | David Leon Clark |
Parution | 06/09/2002 |
Nb. de pages | 284 |
Format | 18,7 x 23,5 |
Couverture | Broché |
Poids | 445g |
Intérieur | Noir et Blanc |
EAN13 | 9780201719727 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet