Résumé
Master the design of secure networks with the updated edition of this best-selling security guide
- Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
- Learn how to use new and legacy Cisco Systems equipment to secure your networks
- Understand how to design and build security services while also learning the legal and network accessibility impact of those services
Designing Network Security, Second Edition is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. In addition it provides a complete description of Cisco security products and useful implementation examples. You will gain a thorough understanding of basic cryptography and the most widely deployed security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities, and understanding the steps required to perform a risk management assessment.
Examine underlying security technologies, the process of creating a security policy, the practical requirements necessary to implement a corporate security policy, the latest security technology enhancements, and recent legal issues. This book also allows you to view many of the new Cisco security products including Altiga, and the NetRanger intrusion detection system.
Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. In addition, practical scenarios dealing specifically with certain types of networks such as voice, storage, VPN, will translate theory into real-world situations.
Contents
- Security Fundamentals
- Basic Cryptography
- Security Technologies
- Export Controls on Cryptography
- Routing Protocol security
- The Corporate Security Policy
- Threats in an Enterprise Network
- Considerations for a Site Security Policy
- Design and Implementation of the Corporate Security Policy
- Incident Handling
- Practical Implementation
- Securing the Corporate Network Infrastructure
- Securing Internet Access
- Securing Dial-In Access
- APPENDICES
- Appendix A- Sources of Technical Information
- Appendix B- Reporting and Prevention Guidelines- Industrial Espionage and Network Intrusions
- Appendix C- Port Numbers
- Appendix D- Mitigating Distributed Denial-of-Service Attacks
- Appendix D- Answers to Review Questions
- Glossary
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Cisco Press |
Auteur(s) | Merike Kaeo |
Parution | 25/11/2003 |
Édition | 2eme édition |
Nb. de pages | 746 |
Format | 19 x 24 |
Couverture | Relié |
Poids | 1450g |
Intérieur | Noir et Blanc |
EAN13 | 9781587051173 |
ISBN13 | 978-1-58705-117-3 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet