Textbook
Wiley Pathways Network Security FundamentalsISBN: 978-0-470-10192-6
Paperback
560 pages
August 2007, ©2008
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 10-15 days delivery time. The book is not returnable.
|
1 Network Security Principles 1
Introduction 2
1.1 Importance of Computer and Network Security 2
1.2 Underlying Computer and Network Security Concepts 6
1.3 Threats and Countermeasures 11
1.4 Policies and Standards 20
2 Network and Server Security 30
Introduction 31
2.1 Network Protocols Review 31
2.2 Best Practices for Network Security 45
2.3 Securing Servers 49
2.4 Border Security 57
3 Cryptography 74
Introduction 75
3.1 Cryptography Overview 75
3.2 Symmetric Encryption 83
3.3 Asymmetric Encryption 90
3.4 Hashes 93
3.5 Achieving CIA 97
3.6 Public Key Infrastructure (PKI) 99
4 Authentication 118
Introduction 119
4.1 Authentication Overview 119
4.2 Authentication Credentials 125
4.3 Authentication Protocols 131
4.4 Best Practices for Secure Authentication 136
5 Authentication and Access Control 149
Introduction 150
5.1 Access Control Models 150
5.2 Implementing Access Control on Windows Computers 154
5.3 Implementing Access Control on Unix Computers 174
6 Securing Network Transmission 188
Introduction 189
6.1 Analyzing Security Requirements for Network Traffic 189
6.2 Defining Network Perimeters 195
6.3 Data Transmission Protection Protocols 201
7 Remote Access and Wireless Security 221
7.1 Dial-Up Networking 222
7.2 Virtual Private Networks 230
7.3 RADIUS and TACACS 235
7.4 Wireless Networks 239
8 Server Roles and Security 262
Introduction 263
8.1 Server Roles and Baselines 263
8.2 Securing Network Infrastructure Servers 274
8.3 Securing Domain Controllers 289
8.4 Securing File and Print Servers 292
8.5 Securing Application Servers 298
9 Protecting Against Malware 310
9.1 Viruses and Other Malware 311
9.2 Protecting the Workstation 315
9.3 Web Browser Security 323
9.4 Email Security 336
10 Ongoing Security Management 356
Introduction 357
10.1 Managing Updates 357
10.2 Auditing and Logging 366
10.3 Secure Remote Administration 371
11 Disaster Recovery and Fault Tolerance 395
Introduction 396
11.1 Planning for the Worst 396
11.2 Creating a Backup Strategy 407
11.3 Designing for Fault Tolerance 415
12 Intrusion Detection and Forensics 433
Introduction 434
12.1 Intrusion Detection 434
12.2 Honeypots 439
12.3 Forensics 444
Glossary 462
Index 507