Корично изображение Електронна книга

Internet security and firewalls /

Основен автор: Preetham, V. V.
Формат: Електронна книга
Език: English
Публикувано: Cincinnati, Ohio : Premier Press, ℗♭2002.
Предмети:
Онлайн достъп: http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=119428
Подобни документи: Print version:: Internet security and firewalls.
Съдържание:
  • ""Contents""; ""Introduction""; ""Chapter 1 Internet Overview""; ""What Is the Internet?""; ""The History of the Internet""; ""Basic Internet Primer""; ""Understanding the OSI Model""; ""Understanding TCP/IP""; ""TCP/IP Layered Architecture""; ""TCP/IP Protocols""; ""Internet Addressing""; ""How the Internet Works""; ""Summary""; ""Check Your Understanding""; ""Multiple Choice Questions""; ""Short Questions""; ""Answers""; ""Multiple Choice Answers""; ""Short Answers""; ""Chapter 2 Network Security Overview""; ""Fundamental Elements of Security""; ""Drafting a Security Model""
  • ""Risk Analysis""""Ensuring the Success of a Security Model""; ""The Evolution of a Security Model""; ""Basic Security Concepts""; ""Cryptography""; ""Authentication""; ""Authorization""; ""Audits""; ""Public Key Infrastructure""; ""Digital Certificates""; ""Common Security Threats""; ""Footprinting""; ""Scanning""; ""Enumeration""; ""Social Engineering""; ""Application and Operating System Attacks""; ""Network Attacks""; ""Denial of Service Attacks""; ""Malicious Software""; ""Assessing Vulnerability""; ""Evaluating the Threats""; ""Analyzing Threats""; ""Threat Modeling""
  • ""Security Strategies""""Least Privilege""; ""Defense In-Depth""; ""Choke Point""; ""Weakest Link""; ""Fail-Safe Stance""; ""Universal Participation""; ""Diversity of Defense""; ""Simplicity""; ""Security through Obscurity""; ""Summary""; ""Check Your Understanding""; ""Multiple Choice Questions""; ""Short Questions""; ""Answers""; ""Multiple Choice Answers""; ""Short Answers""; ""Chapter 3 Firewalls for Network Security""; ""The Origin and Need for Firewalls""; ""The History of Firewalls""; ""The Functions of Firewalls""; ""The Role of Firewalls in Network Security""; ""Types of Firewalls""
  • ""Network-Layer Firewalls""""Application-Layer Firewalls""; ""Constraints and Future Trends of Firewalls""; ""Limitations of Firewalls""; ""Future Developments in Firewalls""; ""Summary""; ""Check Your Understanding""; ""Multiple Choice Questions""; ""Short Questions""; ""Answers""; ""Multiple Choice Answers""; ""Short Answers""; ""Chapter 4 Firewall Technologies""; ""Introduction""; ""TCP/IP Networking""; ""Encapsulation""; ""Demultiplexing""; ""IP Routing""; ""Packet Filtering""; ""The Filtering Process""; ""Advantages of Packet Filtering""; ""Disadvantages of Packet Filtering""
  • ""Proxy Servers""""Features of a Proxy Server""; ""Requirements of a Proxy Service""; ""SOCKS""; ""Advantages of Proxy Services""; ""Disadvantages of Proxy Services""; ""User Authentication""; ""Kerberos""; ""Network Address Translation""; ""How NAT Works""; ""Advantages of NAT""; ""Disadvantages of NAT""; ""Virtual Private Networks""; ""VPN Requirements""; ""Tunneling""; ""Point-to-Point Protocol""; ""Point-to-Point Tunneling Protocol""; ""Layer 2 Tunneling Protocol""; ""Internet Protocol Security (IPSec) Tunnel Mode""; ""Advantages of Virtual Private Networks""