Network security foundations:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco, Calif. [u.a.]
SYBEX
2004
|
Schlagworte: | |
Online-Zugang: | kostenfrei kostenfrei Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | XVII, 315 p. 23cm |
ISBN: | 0782143741 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035880249 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 091211s2004 |||| 00||| eng d | ||
020 | |a 0782143741 |9 0-7821-4374-1 | ||
035 | |a (OCoLC)56661629 | ||
035 | |a (DE-599)GBV390686786 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-M347 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Strebe, Matthew |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network security foundations |c Matthew Strebe |
264 | 1 | |a San Francisco, Calif. [u.a.] |b SYBEX |c 2004 | |
300 | |a XVII, 315 p. |c 23cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | |a Computer networks / Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0619/2004109315-b.html |y Contributor biographical information |z kostenfrei | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0619/2004109315-d.html |y Publisher description |z kostenfrei | |
856 | 4 | |m DE-603 |q pdf/application |u http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf |x 2008-11-30 |z kostenfrei |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737839&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018737839 |
Datensatz im Suchindex
_version_ | 1804140859408515072 |
---|---|
adam_text | NETWORK SECURITY FOUNDATIONS MATTHEW STREBE O SAN FRANCISCO * LONDON
SRBBC CONTENTS INTRODUCTION XV CHAPTER 1 SECURITY PRINCIPLES 1 WHY
COMPUTERS AREN T SECURE 2 THE HISTORY OF COMPUTER SECURITY 4 -1945 5
1945-1955 7 1955-1965 7 1965-1975 7 1975-1985 8 1985-1995 9 1995-2005 11
2005- 12 SECURITY CONCEPTS 13 TRUST 13 AUTHENTICATION 13 CHAIN OF
AUTHORITY 14 ACCOUNTABILITY 15 ACCESS CONTROL 15 TERMS TO KNOW 17 REVIEW
QUESTIONS 18 CHAPTER 2 UNDERSTANDING HACKING 19 WHAT IS HACKING? 20
TYPES OF HACKERS 20 SECURITY EXPERTS 21 SCRIPT KIDDIES 21 UNDEREMPLOYED
ADULT HACKERS 21 IDEOLOGICAL HACKERS 22 CRIMINAL HACKERS 23 CORPORATE
SPIES 23 DISGRUNTLED EMPLOYEES 24 VECTORS THAT HACKERS EXPLOIT 24 DIRECT
INTRUSION 25 DIAL-UP 25 INTERNET 26 WIRELESS 26 VLLL CONTENTS HACKING
TECHNIQUES 27 TARGET SELECTION 27 INFORMATION GATHERING 29 ATTACKS 30
TERMS TO KNOW 37 REVIEW QUESTIONS 38 CHAPTER 3 ENCRYPTION AND
AUTHENTICATION 39 ENCRYPTION 40 SECRET KEY ENCRYPTION 41 ONE-WAY
FUNCTIONS (HASHES) 41 PUBLIC KEY ENCRYPTION 43 HYBRID CRYPTOSYSTEMS 44
AUTHENTICATION 44 PASSWORD AUTHENTICATION 45 SESSION AUTHENTICATION 47
PUBLIC KEY AUTHENTICATION 48 CERTIFICATE-BASED AUTHENTICATION 49
BIOMETRIC AUTHENTICATION 50 TERMS TO KNOW 51 REVIEW QUESTIONS 52 CHAPTER
4 MANAGING SECURITY 53 DEVELOPING A SECURITY POLICY 54 CREATING A POLICY
REQUIREMENTS OUTLINE 54 SECURITY POLICY BEST PRACTICES 58 IMPLEMENTING
SECURITY POLICY 63 APPLYING AUTOMATED POLICY 64 HUMAN SECURITY 65
UPDATING THE SECURITY POLICY 67 THE SECURITY CYCLE 67 TERMS TO KNOW 69
REVIEW QUESTIONS 70 CHAPTER 5 BORDER SECURITY 71 PRINCIPLES OF BORDER
SECURITY 72 UNDERSTANDING FIREWALLS 74 FUNDAMENTAL FIREWALL FUNCTIONS 74
FIREWALL PRIVACY SERVICES 82 VIRTUAL PRIVATE NETWORKS 83 OTHER BORDER
SERVICES 83 CONTENTS SELECTING A FIREWALL 84 TERMS TO KNOW 85 REVIEW
QUESTIONS 86 CHAPTER 6 VIRTUAL PRIVATE NETWORKS 87 VIRTUAL PRIVATE
NETWORKING EXPLAINED 88 IP ENCAPSULATION 88 CRYPTOGRAPHIC AUTHENTICATION
89 DATA PAYLOAD ENCRYPTION 90 CHARACTERISTICS OF VPNS 90 COMMON VPN
IMPLEMENTATIONS 91 IPSEC 92 L2TP 93 PPTP 94 PPP/SSL OR PPP/SSH 95 VPN
BEST PRACTICES 96 TERMS TO KNOW 99 REVIEW QUESTIONS 100 CHAPTER 7
SECURING REMOTE AND HOME USERS 101 THE REMOTE SECURITY PROBLEM 102
VIRTUAL PRIVATE SECURITY HOLES 102 LAPTOPS 102 PROTECTING REMOTE
MACHINES 103 VPN CONNECTIONS 104 DATA PROTECTION AND RELIABILITY 106
BACKUPS AND ARCHIVING 106 PROTECTING AGAINST REMOTE USERS 107 TERMS TO
KNOW 108 REVIEW QUESTIONS 109 CHAPTER 8 MALWARE AND VIRUS PROTECTION 111
UNDERSTANDING MALWARE 112 UNDERSTANDING VIRUSES 112 VIRUS PROTECTION 117
PREVENTION 117 NATURAL IMMUNITY 118 ACTIVE PROTECTION 118 UNDERSTANDING
WORMS AND TROJAN HORSES 119 PROTECTING AGAINST WORMS 121 IMPLEMENTING
VIRUS PROTECTION 121 CONTENTS CLIENT VIRUS PROTECTION 122 SERVER-BASED
VIRUS PROTECTION 123 E-MAIL GATEWAY VIRUS PROTECTION 124 FIREWALL-BASED
VIRUS PROTECTION 124 ENTERPRISE VIRUS PROTECTION 125 TERMS TO KNOW 125
REVIEW QUESTIONS 126 CHAPTER 9 CREATING FAULT TOLERANCE 127 CAUSES FOR
LOSS 128 HUMAN ERROR 128 ROUTINE FAILURE EVENTS 128 CRIMES 130
ENVIRONMENTAL EVENTS 132 FAULT TOLERANCE MEASURES 133 BACKUPS 133
UNINTERRUPTIBLE POWER SUPPLIES (UPSS) AND POWER GENERATORS 138 REDUNDANT
ARRAY OF INDEPENDENT DISKS (RAID) .... 139 PERMISSIONS 141 BORDER
SECURITY 141 AUDITING 141 OFFSITE STORAGE 141 ARCHIVING 142 DEPLOYMENT
TESTING 142 CIRCUIT REDUNDANCY 143 PHYSICAL SECURITY 143 CLUSTERED
SERVERS 144 TERMS TO KNOW 147 REVIEW QUESTIONS 148 CHAPTER 10 WINDOWS
SECURITY 149 WINDOWS LOCAL SECURITY 150 SECURITY IDENTIFIERS 151 LOGGING
IN 152 RESOURCE ACCESS 153 OBJECTS AND PERMISSIONS 154 NTFS FILE SYSTEM
PERMISSIONS 157 ENCRYPTING FILE SYSTEM (EFS) 158 WINDOWS NETWORK
SECURITY 159 ACTIVE DIRECTORY 159 KERBEROS AUTHENTICATION AND DOMAIN
SECURITY 160 GROUP POLICY 163 CONTENTS XI SHARE SECURITY 166 IPSEC 169
TERMS TO KNOW 171 REVIEW QUESTIONS 172 CHAPTER 11 SECURING UNIX SERVERS
173 A BRIEF HISTORY OF UNIX 174 UNIX SECURITY BASICS 177 UNDERSTANDING
UNIX FILE SYSTEMS 177 USER ACCOUNTS 180 FILE SYSTEM SECURITY 184 ACCESS
CONTROL LISTS 186 EXECUTION PERMISSIONS 186 TERMS TO KNOW 189 REVIEW
QUESTIONS 190 CHAPTER 12 UNIX NETWORK SECURITY 191 UNIX NETWORK SECURITY
BASICS 192 REMOTE LOGON SECURITY 193 REMOTE ACCESS 194 PLUGGABLE
AUTHENTICATION MODULE (PAM) 195 DISTRIBUTED LOGON 196 DISTRIBUTED PASSWD
196 NIS AND NIS+ 196 KERBEROS 198 FILE SHARING SECURITY 200 FILE
TRANSFER PROTOCOL (FTP) 201 NETWORK FILE SYSTEM (NFS) 203 HYPERTEXT
TRANSFER PROTOCOL (HTTP) 204 SAMBA 205 FIREWALLING UNIX MACHINES 206
IPTABLES AND IPCHAINS 207 TCP WRAPPERS 208 FIREWALL TOOLKIT (FWTK) 209
TERMS TO KNOW 210 REVIEW QUESTIONS 211 CHAPTER 13 WEB SERVER SECURITY
213 WEB SECURITY PROBLEMS 214 IMPLEMENTING WEB SERVER SECURITY 214
COMMON SECURITY SOLUTIONS 215 CONTENTS APACHE SECURITY 226 INTERNET
INFORMATION SERVICES SECURITY 229 TERMS TO KNOW 235 REVIEW QUESTIONS 236
CHAPTER 14 E-MAIL SECURITY 237 E-MAIL ENCRYPTION AND AUTHENTICATION 238
S/MIME 239 PGP 240 MAIL FORGERY 240 E-MAIL VIRUSES 241 OUTLOOK VIRUSES
242 COMMERCIAL GATEWAY VIRUS SCANNERS 242 AMAVIS 243 ATTACHMENT SECURITY
244 STRIP ALL ATTACHMENTS 244 ALLOW ONLY SPECIFIC ATTACHMENTS 245 STRIP
ONLY DANGEROUS ATTACHMENTS 245 FOREIGN E-MAIL SERVERS 248 SPAM 249
AUTHENTICATING SMTP 250 SYSTEMIC SPAM PREVENTION 253 TERMS TO KNOW 256
REVIEW QUESTIONS 257 CHAPTER 15 INTRUSION DETECTION 259 INTRUSION
DETECTION SYSTEMS 260 INSPECTORS 260 DECOYS 261 AUDITORS 263 AVAILABLE
IDSS 263 WINDOWS SYSTEM 264 TRIPWIRE 265 SNORT 265 DEMARC PURESECURE 266
NFR NETWORK INTRUSION DETECTOR 267 TERMS TO KNOW 267 REVIEW QUESTIONS
268 CONTENTS XIIL APPENDIX A ANSWERS TO REVIEW QUESTIONS 269 CHAPTER 1
269 CHAPTER 2 270 CHAPTER 3 271 CHAPTER 4 272 CHAPTER 5 273 CHAPTER 6
274 CHAPTER 7 275 CHAPTER 8 276 CHAPTER 9 276 CHAPTER 10 278 CHAPTER 11
279 CHAPTER 12 280 CHAPTER 13 281 CHAPTER 14 282 CHAPTER 15 283 GLOSSARY
285 INDEX 299
|
any_adam_object | 1 |
author | Strebe, Matthew |
author_facet | Strebe, Matthew |
author_role | aut |
author_sort | Strebe, Matthew |
author_variant | m s ms |
building | Verbundindex |
bvnumber | BV035880249 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 277 |
ctrlnum | (OCoLC)56661629 (DE-599)GBV390686786 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01843nam a2200433 c 4500</leader><controlfield tag="001">BV035880249</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">091211s2004 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0782143741</subfield><subfield code="9">0-7821-4374-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56661629</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV390686786</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Strebe, Matthew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security foundations</subfield><subfield code="c">Matthew Strebe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, Calif. [u.a.]</subfield><subfield code="b">SYBEX</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 315 p.</subfield><subfield code="c">23cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0619/2004109315-b.html</subfield><subfield code="y">Contributor biographical information</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0619/2004109315-d.html</subfield><subfield code="y">Publisher description</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-603</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf</subfield><subfield code="x">2008-11-30</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737839&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018737839</subfield></datafield></record></collection> |
id | DE-604.BV035880249 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:06:40Z |
institution | BVB |
isbn | 0782143741 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018737839 |
oclc_num | 56661629 |
open_access_boolean | 1 |
owner | DE-M347 |
owner_facet | DE-M347 |
physical | XVII, 315 p. 23cm |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | SYBEX |
record_format | marc |
spelling | Strebe, Matthew Verfasser aut Network security foundations Matthew Strebe San Francisco, Calif. [u.a.] SYBEX 2004 XVII, 315 p. 23cm txt rdacontent n rdamedia nc rdacarrier Computer networks / Security measures Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 http://www.loc.gov/catdir/enhancements/fy0619/2004109315-b.html Contributor biographical information kostenfrei http://www.loc.gov/catdir/enhancements/fy0619/2004109315-d.html Publisher description kostenfrei DE-603 pdf/application http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf 2008-11-30 kostenfrei Inhaltsverzeichnis HEBIS Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737839&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Strebe, Matthew Network security foundations Computer networks / Security measures Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | Network security foundations |
title_auth | Network security foundations |
title_exact_search | Network security foundations |
title_full | Network security foundations Matthew Strebe |
title_fullStr | Network security foundations Matthew Strebe |
title_full_unstemmed | Network security foundations Matthew Strebe |
title_short | Network security foundations |
title_sort | network security foundations |
topic | Computer networks / Security measures Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks / Security measures Computer networks Security measures Computersicherheit Rechnernetz |
url | http://www.loc.gov/catdir/enhancements/fy0619/2004109315-b.html http://www.loc.gov/catdir/enhancements/fy0619/2004109315-d.html http://www.gbv.de/dms/hebis-darmstadt/toc/125038879.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737839&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT strebematthew networksecurityfoundations |