Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
The process of network security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

The process of network security

The process of network security

Designing and Managing A Safe Network

Thomas A. Wadlow

282 pages, parution le 25/02/2000

Résumé

In The Process of NetworkSecurity, security specialist Thomas A.Wadlow reveals the approaches, techniques,and best practices that effectively secure the modern workplace. Written for network managers and administrators responsible for the security of large, enterprise-wide networks, this book focuses on security as a continuous process involving vigilant daily efforts in analysis, implementation, evaluation, and maintenance. It also emphasizes that in order to truly protect the enterprise, security professionals must consider not just individual machines, but the entire systemmachines, people, and procedures. The Process of Network Security discusses the many issues involved and walks you through the specific steps of setting up a secure system, focusing on standard operating procedures and day-to-day operations and maintenance. Providing a broad perspective on the challenge of enterprise security, this book covers a wide range of topics, including:
  • Understanding the nature of attacks and attackers
  • Setting security goals
  • Creating a secure network design
  • Building a team
  • Fortifying network components
  • Implementing physical and personnel security
  • Monitoring and ordering a network
  • Discovering and handling an actual attack
  • Dealing with law enforcement authorities

Table of contents

Chapter 1: Understanding Security
What Are We Protecting?
Thinking Like a Defender
The Reader of This Book
The Organization We Are Protecting
The Process of Security
How Do You Know That the Process Is Working?
Trend Analysis
Chapter 2: Writing a Security Policy
Pitfalls
Staging a Coup
Contents of the Policy
Chapter 3: Who Is Attacking You?
The Nature of the Beast
Security as an Evolutionary Strategy
Chapter 4: Security Design Process
Thinking About Security
Principles of Security
The Shape of Your Defenses
The Shape of Your Security Organization
Chapter 5: Building a Security Team
Employee Characteristics
Job Functions in a Security Team
Training and Cross-Training
Interviewing Security Candidates
Background Checks
Hiring
Firing
Chapter 6: Fortifying Network Components
What Is a Network Component?
Component Types
Selecting Components
Component Categories
Fortifying Components
System Fortification
Chapter 7: Personnel Security
Management Issues
Hiring Process
Trouble with Employees
Firing Process
Resignation Process
Contractors
Chapter 8: Physical Security
What Are the Threats?
Physical Security Basics
Going Overboard
Backups
Denial of Service
Electrical Power
Telephones
Access Control Logging and Log Analysis
Chapter 9: Monitoring Your Network
The Shape of the Logging System
What to Log
Logging Mechanisms
Time
Sensors
Logging System Design
Log Management
Log Analysis
Chapter 10: Auditing Your Network
Why Should You Audit Your Network?
Types of Audit
What Should the Audit Measure?
Who Should Do the Audit?
Expectations
Chapter 11: Quantifying the Value of Security
Perception of Value
Process of Explaining Security Issues
Measurements
Chapter 12: Preparing for an Attack
Getting Started
War Games
Post-Mortem Analysis
Developing a Response Plan
Personnel
Safety Equipment
Survival Pack Contents
Choosing Hiding Places
Set Your Own Ground Rules
Chapter 13: Handling an Attack
Exciting, but Not Fun
Thinking Pathologically
About Attacks
What You Can Do
What You Should Not Do
Response Team
Priorities During an Attack
Chapter 14: Forensics
Getting Started
The Art of Investigation
The Clean Room
Analyzing the Contaminated File System
Analysis Tools
What to Look For
Chapter 15: Log Analysis
Integrity Checks
Log Analysis
The Hunt
Developing Theories
Legalities
Chapter 16: Damage Control
Priorities
Advance Preparation
Post-Mortem Analysis
Appendix A: Glossary

L'auteur - Thomas A. Wadlow

Thomas A. Wadlow

is co-founder, Chief Technology Officer, and Vice-President of Engineering and Security for Pilot Network Services, Inc., a company specializing in Internet security. He has also worked as a networking and systems professional for Lawrence Livermore Laboratory, Schlumberger's Palo Alto Research Center, Xerox's Palo Alto Research Center, ParcPlace Systems, and Sun Microsystems Laboratories.

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Thomas A. Wadlow
Parution 25/02/2000
Nb. de pages 282
Format 18,5 x 23,5
Poids 614g
EAN13 9780201433173

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription