Internet security and firewalls /
Основен автор: | Preetham, V. V. |
---|---|
Формат: | Електронна книга |
Език: | English |
Публикувано: |
Cincinnati, Ohio :
Premier Press,
℗♭2002.
|
Предмети: | |
Онлайн достъп: |
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=119428 |
Подобни документи: |
Print version::
Internet security and firewalls. |
Съдържание:
- ""Contents""; ""Introduction""; ""Chapter 1 Internet Overview""; ""What Is the Internet?""; ""The History of the Internet""; ""Basic Internet Primer""; ""Understanding the OSI Model""; ""Understanding TCP/IP""; ""TCP/IP Layered Architecture""; ""TCP/IP Protocols""; ""Internet Addressing""; ""How the Internet Works""; ""Summary""; ""Check Your Understanding""; ""Multiple Choice Questions""; ""Short Questions""; ""Answers""; ""Multiple Choice Answers""; ""Short Answers""; ""Chapter 2 Network Security Overview""; ""Fundamental Elements of Security""; ""Drafting a Security Model""
- ""Risk Analysis""""Ensuring the Success of a Security Model""; ""The Evolution of a Security Model""; ""Basic Security Concepts""; ""Cryptography""; ""Authentication""; ""Authorization""; ""Audits""; ""Public Key Infrastructure""; ""Digital Certificates""; ""Common Security Threats""; ""Footprinting""; ""Scanning""; ""Enumeration""; ""Social Engineering""; ""Application and Operating System Attacks""; ""Network Attacks""; ""Denial of Service Attacks""; ""Malicious Software""; ""Assessing Vulnerability""; ""Evaluating the Threats""; ""Analyzing Threats""; ""Threat Modeling""
- ""Security Strategies""""Least Privilege""; ""Defense In-Depth""; ""Choke Point""; ""Weakest Link""; ""Fail-Safe Stance""; ""Universal Participation""; ""Diversity of Defense""; ""Simplicity""; ""Security through Obscurity""; ""Summary""; ""Check Your Understanding""; ""Multiple Choice Questions""; ""Short Questions""; ""Answers""; ""Multiple Choice Answers""; ""Short Answers""; ""Chapter 3 Firewalls for Network Security""; ""The Origin and Need for Firewalls""; ""The History of Firewalls""; ""The Functions of Firewalls""; ""The Role of Firewalls in Network Security""; ""Types of Firewalls""
- ""Network-Layer Firewalls""""Application-Layer Firewalls""; ""Constraints and Future Trends of Firewalls""; ""Limitations of Firewalls""; ""Future Developments in Firewalls""; ""Summary""; ""Check Your Understanding""; ""Multiple Choice Questions""; ""Short Questions""; ""Answers""; ""Multiple Choice Answers""; ""Short Answers""; ""Chapter 4 Firewall Technologies""; ""Introduction""; ""TCP/IP Networking""; ""Encapsulation""; ""Demultiplexing""; ""IP Routing""; ""Packet Filtering""; ""The Filtering Process""; ""Advantages of Packet Filtering""; ""Disadvantages of Packet Filtering""
- ""Proxy Servers""""Features of a Proxy Server""; ""Requirements of a Proxy Service""; ""SOCKS""; ""Advantages of Proxy Services""; ""Disadvantages of Proxy Services""; ""User Authentication""; ""Kerberos""; ""Network Address Translation""; ""How NAT Works""; ""Advantages of NAT""; ""Disadvantages of NAT""; ""Virtual Private Networks""; ""VPN Requirements""; ""Tunneling""; ""Point-to-Point Protocol""; ""Point-to-Point Tunneling Protocol""; ""Layer 2 Tunneling Protocol""; ""Internet Protocol Security (IPSec) Tunnel Mode""; ""Advantages of Virtual Private Networks""