دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Sean Convery
سری:
ISBN (شابک) : 158714297X, 9781587142970
ناشر: Cisco Press
سال نشر: 2004
تعداد صفحات: 760
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 12 مگابایت
در صورت تبدیل فایل کتاب Network Security Architectures (Networking Technology) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب معماری امنیت شبکه (فناوری شبکه) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Network Security Architectures Table of Contents Copyright About the Author About the Technical Reviewers Acknowledgments A Note from Cisco Systems on the SAFE Blueprint and Network Security Architectures Icons Used in This Book Command Syntax Conventions Foreword Preface This Book\'s Relationship to the SAFE White Papers Why Network Security? New Technologies, New Vulnerabilities How This Book Is Organized Who Should Read This Book? Caveats Summary Part I. Network Security Foundations Chapter 1. Network Security Axioms Network Security Is a System Business Priorities Must Come First Network Security Promotes Good Network Design Everything Is a Target Everything Is a Weapon Strive for Operational Simplicity Good Network Security Is Predictable Avoid Security Through Obscurity Confidentiality and Security Are Not the Same Summary Reference Applied Knowledge Questions Chapter 2. Security Policy and Operations Life Cycle You Can\'t Buy Network Security What Is a Security Policy? Security System Development and Operations Overview Summary References Applied Knowledge Questions Chapter 3. Secure Networking Threats The Attack Process Attacker Types Vulnerability Types Attack Results Attack Taxonomy Summary References Applied Knowledge Questions Chapter 4. Network Security Technologies The Difficulties of Secure Networking Security Technologies Emerging Security Technologies Summary References Applied Knowledge Questions Part II. Designing Secure Networks Chapter 5. Device Hardening Components of a Hardening Strategy Network Devices NIDS Host Operating Systems Applications Appliance-Based Network Services Rogue Device Detection Summary References Applied Knowledge Questions Chapter 6. General Design Considerations Physical Security Issues Layer 2 Security Considerations IP Addressing Design Considerations ICMP Design Considerations Routing Considerations Transport Protocol Design Considerations DoS Design Considerations Summary References Applied Knowledge Questions Chapter 7. Network Security Platform Options and Best Deployment Practices Network Security Platform Options Network Security Device Best Practices Summary Reference Applied Knowledge Questions Chapter 8. Common Application Design Considerations E-Mail DNS HTTP/HTTPS FTP Instant Messaging Application Evaluation Summary References Applied Knowledge Questions Chapter 9. Identity Design Considerations Basic Foundation Identity Concepts Types of Identity Factors in Identity Role of Identity in Secure Networking Identity Technology Guidelines Identity Deployment Recommendations Summary References Applied Knowledge Questions Chapter 10. IPsec VPN Design Considerations VPN Basics Types of IPsec VPNs IPsec Modes of Operation and Security Options Topology Considerations Design Considerations Site-to-Site Deployment Examples IPsec Outsourcing Summary References Applied Knowledge Questions Chapter 11. Supporting-Technology Design Considerations Content Load Balancing Wireless LANs IP Telephony Summary References Applied Knowledge Questions Chapter 12. Designing Your Security System Network Design Refresher Security System Concepts Impact of Network Security on the Entire Design Ten Steps to Designing Your Security System Summary Applied Knowledge Questions Part III. Secure Network Designs Chapter 13. Edge Security Design What Is the Edge? Expected Threats Threat Mitigation Identity Considerations Network Design Considerations Small Network Edge Security Design Medium Network Edge Security Design High-End Resilient Edge Security Design Provisions for E-Commerce and Extranet Design Summary References Applied Knowledge Questions Chapter 14. Campus Security Design What Is the Campus? Campus Trust Model Expected Threats Threat Mitigation Identity Considerations Network Design Considerations Small Network Campus Security Design Medium Network Campus Security Design High-End Resilient Campus Security Design Summary References Applied Knowledge Questions Chapter 15. Teleworker Security Design Defining the Teleworker Environment Expected Threats Threat Mitigation Identity Considerations Network Design Considerations Software-Based Teleworker Design Hardware-Based Teleworker Design Design Evaluations Summary Reference Applied Knowledge Questions Part IV. Network Management, Case Studies, and Conclusions Chapter 16. Secure Network Management and Network Security Management Utopian Management Goals Organizational Realities Protocol Capabilities Tool Capabilities Secure Management Design Options Network Security Management Best Practices Summary References Applied Knowledge Questions Chapter 17. Case Studies Introduction Real-World Applicability Organization NetGamesRUs.com University of Insecurity Black Helicopter Research Limited Summary Reference Applied Knowledge Questions Chapter 18. Conclusions Introduction Management Problems Will Continue Security Will Become Computationally Less Expensive Homogeneous and Heterogeneous Networks Legislation Should Garner Serious Consideration IP Version 6 Changes Things Network Security Is a System Summary References Appendix A. Glossary of Terms Appendix B. Answers to Applied Knowledge Questions Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Appendix C. Sample Security Policies INFOSEC Acceptable Use Policy Password Policy Guidelines on Antivirus Process Index SYMBOL A B C D E F G H I K L M N O P Q R S T U V W X Z