ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Network Security Architectures (Networking Technology)

دانلود کتاب معماری امنیت شبکه (فناوری شبکه)

Network Security Architectures (Networking Technology)

مشخصات کتاب

Network Security Architectures (Networking Technology)

ویرایش: 1 
نویسندگان:   
سری:  
ISBN (شابک) : 158714297X, 9781587142970 
ناشر: Cisco Press 
سال نشر: 2004 
تعداد صفحات: 760 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 12 مگابایت 

قیمت کتاب (تومان) : 50,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Network Security Architectures (Networking Technology) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب معماری امنیت شبکه (فناوری شبکه) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Network Security Architectures
Table of Contents
Copyright
About the Author
	About the Technical Reviewers
Acknowledgments
A Note from Cisco Systems on the SAFE Blueprint and Network Security Architectures
Icons Used in This Book
Command Syntax Conventions
Foreword
Preface
	This Book\'s Relationship to the SAFE White Papers
	Why Network Security?
	New Technologies, New Vulnerabilities
	How This Book Is Organized
	Who Should Read This Book?
	Caveats
	Summary
Part I. Network Security Foundations
	Chapter 1. Network Security Axioms
		Network Security Is a System
		Business Priorities Must Come First
		Network Security Promotes Good Network Design
		Everything Is a Target
		Everything Is a Weapon
		Strive for Operational Simplicity
		Good Network Security Is Predictable
		Avoid Security Through Obscurity
		Confidentiality and Security Are Not the Same
		Summary
		Reference
		Applied Knowledge Questions
	Chapter 2. Security Policy and Operations Life Cycle
		You Can\'t Buy Network Security
		What Is a Security Policy?
		Security System Development and Operations Overview
		Summary
		References
		Applied Knowledge Questions
	Chapter 3. Secure Networking Threats
		The Attack Process
		Attacker Types
		Vulnerability Types
		Attack Results
		Attack Taxonomy
		Summary
		References
		Applied Knowledge Questions
	Chapter 4. Network Security Technologies
		The Difficulties of Secure Networking
		Security Technologies
		Emerging Security Technologies
		Summary
		References
		Applied Knowledge Questions
Part II. Designing Secure Networks
	Chapter 5. Device Hardening
		Components of a Hardening Strategy
		Network Devices
		NIDS
		Host Operating Systems
		Applications
		Appliance-Based Network Services
		Rogue Device Detection
		Summary
		References
		Applied Knowledge Questions
	Chapter 6. General Design Considerations
		Physical Security Issues
		Layer 2 Security Considerations
		IP Addressing Design Considerations
		ICMP Design Considerations
		Routing Considerations
		Transport Protocol Design Considerations
		DoS Design Considerations
		Summary
		References
		Applied Knowledge Questions
	Chapter 7. Network Security Platform Options and Best Deployment Practices
		Network Security Platform Options
		Network Security Device Best Practices
		Summary
		Reference
		Applied Knowledge Questions
	Chapter 8. Common Application Design Considerations
		E-Mail
		DNS
		HTTP/HTTPS
		FTP
		Instant Messaging
		Application Evaluation
		Summary
		References
		Applied Knowledge Questions
	Chapter 9. Identity Design Considerations
		Basic Foundation Identity Concepts
		Types of Identity
		Factors in Identity
		Role of Identity in Secure Networking
		Identity Technology Guidelines
		Identity Deployment Recommendations
		Summary
		References
		Applied Knowledge Questions
	Chapter 10. IPsec VPN Design Considerations
		VPN Basics
		Types of IPsec VPNs
		IPsec Modes of Operation and Security Options
		Topology Considerations
		Design Considerations
		Site-to-Site Deployment Examples
		IPsec Outsourcing
		Summary
		References
		Applied Knowledge Questions
	Chapter 11. Supporting-Technology Design Considerations
		Content
		Load Balancing
		Wireless LANs
		IP Telephony
		Summary
		References
		Applied Knowledge Questions
	Chapter 12. Designing Your Security System
		Network Design Refresher
		Security System Concepts
		Impact of Network Security on the Entire Design
		Ten Steps to Designing Your Security System
		Summary
		Applied Knowledge Questions
Part III. Secure Network Designs
	Chapter 13. Edge Security Design
		What Is the Edge?
		Expected Threats
		Threat Mitigation
		Identity Considerations
		Network Design Considerations
		Small Network Edge Security Design
		Medium Network Edge Security Design
		High-End Resilient Edge Security Design
		Provisions for E-Commerce and Extranet Design
		Summary
		References
		Applied Knowledge Questions
	Chapter 14. Campus Security Design
		What Is the Campus?
		Campus Trust Model
		Expected Threats
		Threat Mitigation
		Identity Considerations
		Network Design Considerations
		Small Network Campus Security Design
		Medium Network Campus Security Design
		High-End Resilient Campus Security Design
		Summary
		References
		Applied Knowledge Questions
	Chapter 15. Teleworker Security Design
		Defining the Teleworker Environment
		Expected Threats
		Threat Mitigation
		Identity Considerations
		Network Design Considerations
		Software-Based Teleworker Design
		Hardware-Based Teleworker Design
		Design Evaluations
		Summary
		Reference
		Applied Knowledge Questions
Part IV. Network Management, Case Studies, and Conclusions
	Chapter 16. Secure Network Management and Network Security Management
		Utopian Management Goals
		Organizational Realities
		Protocol Capabilities
		Tool Capabilities
		Secure Management Design Options
		Network Security Management Best Practices
		Summary
		References
		Applied Knowledge Questions
	Chapter 17. Case Studies
		Introduction
		Real-World Applicability
		Organization
		NetGamesRUs.com
		University of Insecurity
		Black Helicopter Research Limited
		Summary
		Reference
		Applied Knowledge Questions
	Chapter 18. Conclusions
		Introduction
		Management Problems Will Continue
		Security Will Become Computationally Less Expensive
		Homogeneous and Heterogeneous Networks
		Legislation Should Garner Serious Consideration
		IP Version 6 Changes Things
		Network Security Is a System
		Summary
		References
Appendix A. Glossary of Terms
Appendix B. Answers to Applied Knowledge Questions
	Chapter 1
	Chapter 2
	Chapter 3
	Chapter 4
	Chapter 5
	Chapter 6
	Chapter 7
	Chapter 8
	Chapter 9
	Chapter 10
	Chapter 11
	Chapter 12
	Chapter 13
	Chapter 14
	Chapter 15
	Chapter 16
Appendix C. Sample Security Policies
	INFOSEC Acceptable Use Policy
	Password Policy
	Guidelines on Antivirus Process
Index
	SYMBOL
	A
	B
	C
	D
	E
	F
	G
	H
	I
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X
	Z




نظرات کاربران