Hardening Network Security

John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric S. Seagren, Paul Love, Rob Kraft, Mark O'Neill, Robert McMullin

  • 出版商: McGraw-Hill Osborne Media
  • 出版日期: 2005-01-11
  • 售價: $1,670
  • 貴賓價: 9.5$1,587
  • 語言: 英文
  • 頁數: 608
  • 裝訂: Paperback
  • ISBN: 0072257032
  • ISBN-13: 9780072257038
  • 相關分類: 資訊安全

下單後立即進貨 (2~3週)

商品描述

傳送訂單至便利達康

Description:

Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.

Features a four-part hardening methodology:

  • Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack
  • Take It From The Top--Systematic approach to hardening your enterprise from the top down
  • Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing
  • How to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program

 

Table of Contents:

Part I: Do This Now!
Chapter 1: Do These 7 Things Before You Do Anything Else
Part II: Take it From the Top. Systematically Hardening Your Enterprise
Chapter 2: Break the Network into Areas of Common Functionality
Chapter 3: Hardening with Identity Management Systems
Chapter 4: Hardening Cross Platform Authentication
Chapter 5: Implement Secure Centralized Authentication Mechanisms
Chapter 6: Mobile Authentication Considerations
Chapter 7: Beyond Access Controls - Protecting Stored Data
Chapter 8: Hardening Database Access
Chapter 9: Hardening Cross Platform Access Controls
Chapter 10: Hardening Data Transport Using Encryption
Chapter 11: Hardening Remote Clients (Windows, Mac, *nix)
Chapter 12: Hardening Wireless
Chapter 13: Hardening a Mixed Unix Network
Chapter 14: Intrusion Detection and Response
Chapter 15: Managing Malicious Code
Chapter 16: Hardening Wetware
Part III: Once is Never Enough
Chapter 17: Auditing and Testing Security
Chapter 18: Change Management
Chapter 19: Security Patching
Chapter 20: Security Review
Part IV: How to Succeed at Hardening
Chapter 21: Politics of Security Management
Chapter 22: Security Agnostics