Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Network Security Bible,

Network Security Bible,

of: Eric Cole

Wiley, 2011

ISBN: 9780470570005 , 939 Pages

Format: PDF, ePUB, Read online

Copy protection: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones Read Online for: Windows PC,Mac OSX,Linux

Price: 38,99 EUR



More of the content

Network Security Bible,


 

Network Security Bible Second Edition

1

About the Author

9

About the Technical Editor

9

Credits

11

Acknowledgments

13

Contents at a Glance

15

Contents

17

Introduction

37

The Goal of This Book

37

How to Use This Book

38

Who Should Read This Book

40

How This Book Is Organized

40

Where To Go From Here

46

Part I: Network Security Landscape

47

Chapter 1: State of Network Security

49

Cyber Security

49

Summary

53

Chapter 2: New Approaches to Cyber Security

55

General Trends

55

The Changing Face of Cyber Security

62

Summary

63

Chapter 3: Interfacing with the Organization

65

An Enterprise Security Methodology

65

Key Questions to Manage Risk

73

Summary

78

Part II: Security Principles and Practices

79

Chapter 4: Information System Security Principles

81

Key Principles of Network Security

81

Formal Processes

83

Risk Management

106

Calculating and Managing Risk

116

Summary

117

Chapter 5: Information System Security Management

119

Security Policies

119

Security Awareness

123

Managing the Technical Effort

125

Configuration Management

133

Business Continuity and Disaster Recovery Planning

136

Physical Security

144

Legal and Liability Issues

151

Summary

153

Chapter 6: Access Control

155

Control Models

155

Types of Access Control Implementations

158

Identification and Authentication

161

Databases

167

Remote Access

169

Summary

171

Chapter 7: Attacks and Threats

173

Malicious Code

173

Review of Common Attacks

175

External Attack Methodologies Overview

182

Internal Threat Overview

186

Summary

188

Part III: Operating Systems and Applications

189

Chapter 8: Windows Security

191

Windows Security at the Heart of the Defense

193

Out-of-the-Box Operating System Hardening

197

Installing Applications

217

Putting the Workstation on the Network

221

Operating Windows Safely

223

Upgrades and Patches

237

Maintain and Test the Security

240

Attacks Against the Windows Workstation

244

Summary

251

Chapter 9: UNIX and Linux Security

253

The Focus of UNIX/Linux Security

253

Physical Security

258

Controlling the Configuration

263

Operating UNIX Safely

270

Hardening UNIX

291

Summary

299

Chapter 10: Web Browser and Client Security

301

Web Browser and Client Risk

301

How a Web Browser Works

305

Web Browser Attacks

314

Operating Safely

317

Web Browser Configurations

322

Summary

332

Chapter 11: Web Security

333

What Is HTTP?

333

How Does HTTP Work?

335

Server Content

347

Client Content

349

State

355

Attacking Web Servers

361

Web Services

363

Summary

367

Chapter 12: Electronic mail (E-mail) Security

369

The E-mail Risk

369

The E-mail Protocols

386

E-mail Authentication

391

Operating Safely When Using E-mail

394

Summary

401

Chapter 13: Domain Name System

403

DNS Basics

404

Purpose of DNS

410

Setting Up DNS

421

Security Issues with DNS

423

DNS Attacks

430

Designing DNS

432

Master Slave DNS

434

Detailed DNS Architecture

434

DNS SEC

435

Summary

439

Chapter 14: Server Security

441

General Server Risks

441

Security by Design

442

Operating Servers Safely

459

Server Applications

463

Multi-Level Security and Digital Rights Management

467

Summary

473

Part IV: Network Security Fundamentals

475

Chapter 15: Network Protocols

477

Protocols

477

The Open Systems Interconnect Model

478

The OSI Layers

479

The TCP/IP Model

485

TCP/IP Model Layers

487

Internet Protocol

488

VoIP

496

Summary

503

Chapter 16: Wireless Security

505

Electromagnetic Spectrum

505

The Cellular Phone Network

508

Placing a Cellular Telephone Call

510

Wireless Transmission Systems

515

Pervasive Wireless Data Network Technologies

519

IEEE Wireless LAN Specifications

524

IEEE 802.11

526

IEEE 802.11 Wireless Security

531

Bluetooth

549

Wireless Application Protocol

550

Future of Wireless

552

Summary

554

Chapter 17: Network Architecture Fundamentals

555

Network Segments

556

Perimeter Defense

557

Network Address Translation

557

Basic Architecture Issues

559

Subnetting, Switching, and VLANs

562

Address Resolution Protocol and Media Access Control

563

Dynamic Host Configuration Protocol and Addressing Control

564

Zero Configuration Networks

565

System Design and Architecture Against Insider Threats

571

Common Attacks

574

Summary

575

Chapter 18: Firewalls

577

Firewalls

577

Firewall Rules

583

The Use of Personal Firewalls

588

Summary

594

Chapter 19: Intrusion Detection/Prevention

595

Intrusion Detection Systems

595

Responses to Intrusion Detection

602

Emerging Technologies in Intrusion Detection Systems

602

Summary

613

Part V: Communication

615

Chapter 20: Secret Communication

617

What is Cryptography?

618

General Terms

622

Principles of Cryptography

623

Historic Cryptography

627

The Four Cryptographic Primitives

633

Putting These Primitives Together to Achieve CIA

648

The Difference Between Algorithm and Implementation

649

Proprietary Versus Open Source Algorithms

652

Attacks on Hash Functions

653

Quantum Cryptography

663

Summary

674

Chapter 21: Covert Communication

677

Where Hidden Data Hides

677

Where Did It Come From?

679

Where Is It Going?

679

Overview of Steganography

680

History of Steganography

685

Core Areas of Network Security and Their Relation to Steganography

687

Principles of Steganography

689

Steganography Compared to Cryptography

690

Types of Steganography

692

Products That Implement Steganography

700

Steganography Versus Digital Watermarking

719

Types of Digital Watermarking

721

Goals of Digital Watermarking

722

Digital Watermarking and Stego

722

Summary

725

Chapter 22: Applications of Secure/Covert Communication

727

E-mail

728

Authentication Servers

731

Working Model

732

Public Key Infrastructure

734

Virtual Private Networks

738

Secure Sockets Layer/Transport Layer Security

745

SSL Handshake

746

Summary

750

Part VI: The Security Threat and Response

751

Chapter 23: Intrusion Detection and Response

753

Intrusion Detection Mechanisms

753

Honeypots

758

Incident Handling

762

Summary

773

Chapter 24: Digital Forensics

775

Computer Forensics Defined

776

Traditional Computer Forensics

776

Proactive Forensics

792

Future Research Areas

794

The Forensic Life Cycle

796

Summary

796

Chapter 25: Security Assessments, Testing, and Evaluation

797

Information Assurance Approaches and Methodologies

797

Certification and Accreditation

802

DIACAP

806

Federal Information Processing Standard 102

809

OMB Circular A-130

810

The National Institute of Standards and Technology Assessment Guidelines

811

Penetration Testing

816

Auditing and Monitoring

818

Summary

820

Part VII: Integrated Cyber Security

821

Chapter 26: Validating Your Security

823

Overview

823

Current State of Penetration Testing

826

Formal Penetration Testing Methodology

829

Steps to Exploiting a System

833

Summary

841

Chapter 27: Data Protection

843

Endpoint Security

845

Insider Threats and Data Protection

851

Summary

852

Chapter 28: Putting Everything Together

855

Critical Problems Facing Organizations

855

General Tips for Protecting a Site

861

Security Best Practices

865

Summary

880

Chapter 29: The Future

881

Approaching the Problem

881

Mission Resilience

883

Limiting Failure Points

890

Summary

893

Index

895