The CERT Guide to System and Network Security Practices
Résumé
The SEI Series in Software Engineering
As the Internet and other information infrastructures have become larger, more complex, and more interdependent, unauthorized intrusions into computer systems and networks have become more frequent and more severe. It is increasingly critical that an organization secure the systems it connects to public networks. The CERT Coordination Center ®, the first computer security response group, was established to help systems administrators meet these challenges by publishing advisories and developing key security practices, implementations, and tech tips on a timely basis. The CERT ® Guide to System and Network Security makes these practices and implementations available for the first time in book form.With a practical, stepwise approach, the book shows administrators how to protect systems and networks against malicious and inadvertent compromise. If you are installing, configuring, operating, or maintaining systems or networks--or managing any of those functions--you will find here easy-to-implement guidance to protect your information infrastructure. The practices are platform- and operating-system independent; however, several procedural and tool-based implementations are provided to illustrate the technology-specific guidance that is freely available from the CERT Web site (www.cert.org).
The book is divided into two main parts, the first dealing with hardening and securing your system--preventing problems in the first place. The second part covers intrusion detection and response, recognizing that even the most secure networks and systems cannot protect against every conceivable threat. The practices selected for the book are based on CERT's extensive data on security breaches and vulnerabilities, providing an authoritative view of the most common problems system and network administrators confront.
See how to:
- Secure general-purpose network servers and user workstations
- Configure public Web servers to operate securely including the use of authentication and encryption technologies
- Configure, test, and deploy firewall systems
- Detect, respond to, and recover from intrusions
- Implement selected practices on systems running a Solaris 2.x operating system
- Identify practice-related topics to address in your security policies
By implementing the security practices described in this book, you will be incorporating protection mechanisms for up to 80 percent of the security incidents reported to CERT.
Contents
- Preface.
- 1. The Handbook of System and Network Security Practices.
- 2. Securing Network Servers and User Workstations.
- 3. Securing Public Web Servers.
- 4. Deploying Firewalls.
- 5. Setting Up Intrusion Detection and Response Practices.
- 6. Detecting Signs of Intrusion.
- 7. Responding to Intrusions.
- Appendix A. Security Implementations.
- Appendix B. Practice-Level Policy Considerations.
- Index.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | Julia H. Allen |
Parution | 01/07/2001 |
Nb. de pages | 448 |
Format | 18,6 x 23,4 |
Couverture | Broché |
Poids | 700g |
Intérieur | Noir et Blanc |
EAN13 | 9780201737233 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet