Guide to firewalls and network security :intrusion detection and VPNs:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston, Mass.
Course Technology/Cengage Learning
2009
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index. - Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004 |
Beschreibung: | XXIV, 496 S. Ill., graph. Darst. 24 cm |
ISBN: | 1435420160 9781435420168 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV037393179 | ||
003 | DE-604 | ||
005 | 20110526 | ||
007 | t | ||
008 | 110511s2009 ad|| |||| 00||| eng d | ||
020 | |a 1435420160 |c (pbk) : £47.99 |9 1-435-42016-0 | ||
020 | |a 9781435420168 |c (pbk) : £47.99 |9 978-1-435-42016-8 | ||
035 | |a (OCoLC)610748977 | ||
035 | |a (DE-599)GBV567048381 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-522 | ||
245 | 1 | 0 | |a Guide to firewalls and network security :intrusion detection and VPNs |c Michael E. Whitman |
250 | |a 2nd ed. | ||
264 | 1 | |a Boston, Mass. |b Course Technology/Cengage Learning |c 2009 | |
300 | |a XXIV, 496 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. - Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004 | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Whitman, Michael E. |d 1964- |e Sonstige |0 (DE-588)173003621 |4 oth | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022546026&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-022546026 |
Datensatz im Suchindex
_version_ | 1804145683123404800 |
---|---|
adam_text | IMAGE 1
INTRODUCTION
P. XVII
INTRODUCTION TO INFORMATION SECURITY
P. 1
INTRODUCTION
P. 2
WHAT IS INFORMATION SECURITY?
P. 3
CRITICAL CHARACTERISTICS OF INFORMATION
P. 4
CNSS SECURITY MODEL
P. 5
SECURING COMPONENTS
P. 6
BALANCING INFORMATION SECURITY AND ACCESS
P. 6
BUSINESS NEEDS FIRST
P. 7
PROTECTING THE FUNCTIONALITY OF AN ORGANIZATION
P. 7
ENABLING THE SAFE OPERATION OF APPLICATIONS
P. 8
PROTECTING DATA THAT ORGANIZATIONS COLLECT AND USE
P. 8
SAFEGUARDING TECHNOLOGY ASSETS IN ORGANIZATIONS
P. 8
SECURITY PROFESSIONALS AND THE ORGANIZATION
P. 8
DATA OWNERSHIP
P. 9
THREATS
P. 10
HUMAN ERROR OR FAILURE
P. 11
COMPROMISES TO INTELLECTUAL PROPERTY
P. 12
ESPIONAGE OR TRESPASS
P. 13
INFORMATION EXTORTION
P. 16
SABOTAGE OR VANDALISM
P. 16
THEFT
P. 17
SOFTWARE ATTACKS
P. 17
FORCES OF NATURE
P. 20
DEVIATIONS IN QUALITY OF SERVICE
P. 21
HARDWARE FAILURES OR ERRORS
P. 22
SOFTWARE FAILURES OR ERRORS
P. 23
OBSOLESCENCE
P. 23
ATTACKS
P. 23
MALICIOUS CODE
P. 23
HOAXES
P. 24
BACK DOORS
P. 24
PASSWORD CRACK
P. 25
BRUTE FORCE
P. 25
DICTIONARY
P. 25
DENIAL-OF-SERVICE (DOS) AND DISTRIBUTED DENIAL-OF-SERVICE (DDOS) P. 25
SPOOFING
P. 26
MAN-IN-THE-MIDDLE
P. 27
SPAM
P. 28
MAIL BOMBING
P. 28
SNIFFERS
P. 28
IMAGE 2
SOCIAL ENGINEERING
P. 28
BUFFER OVERFLOW
P. 30
TIMING ATTACK
P. 30
CHAPTER SUMMARY
P. 30
REVIEW QUESTIONS
P. 31
EXERCISES
P. 32
CASE EXERCISES
P. 33
AN INTRODUCTION TO NETWORKING
P. 37
INTRODUCTION
P. 38
NETWORKING FUNDAMENTALS
P. 38
REASONS TO NETWORK
P. 39
TYPES OF NETWORKS
P. 40
NETWORK STANDARDS
P. 42
INTERNET SOCIETY (ISOC)
P. 42
INTERNET ASSIGNED NUMBERS AUTHORITY (IANA)
P. 42
AMERICAN NATIONAL STANDARDS INSTITUTE (ANSI)
P. 43
INTERNATIONAL TELECOMMUNICATION UNION (ITU)
P. 43
INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS (IEEE)
P. 43
TELECOMMUNICATIONS INDUSTRY ASSOCIATION (TIA)
P. 43
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION (ISO)
P. 44
OSI REFERENCE MODEL AND SECURITY
P. 44
THE PHYSICAL LAYER
P. 45
DATA LINK LAYER
P. 53
NETWORK LAYER
P. 56
TRANSPORT LAYER
P. 59
SESSION LAYER
P. 64
PRESENTATION LAYER
P. 64
APPLICATION LAYER
P. 64
THE INTERNET AND TCP/IP
P. 66
THE WORLD WIDE WEB
P. 66
TCP/IP
P. 67
CHAPTER SUMMARY
P. 69
REVIEW QUESTIONS
P. 70
EXERCISES
P. 71
CASE EXERCISES
P. 71
SECURITY POLICIES, STANDARDS, AND PLANNING
P. 73
INTRODUCTION
P. 74
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
P. 75
DEFINITIONS
P. 75
ENTERPRISE INFORMATION SECURITY POLICY (EISP)
P. 77
ISSUE-SPECIFIC SECURITY POLICY (ISSP)
P. 78
IMAGE 3
SYSTEM-SPECIFIC POLICY (SYSSP)
P. 81
POLICY MANAGEMENT
P. 83
FRAMEWORKS AND INDUSTRY STANDARDS
P. 85
THE ISO 27000 SERIES
P. 86
NIST SECURITY MODELS
P. 90
IETF SECURITY ARCHITECTURE
P. 91
BENCHMARKING AND BEST BUSINESS PRACTICES
P. 91
SECURITY ARCHITECTURE
P. 92
SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM
P. 95
SECURITY EDUCATION
P. 96
SECURITY TRAINING
P. 96
SECURITY AWARENESS
P. 97
CONTINUITY STRATEGIES
P. 98
BUSINESS IMPACT ANALYSIS
P. 101
INCIDENT RESPONSE PLANNING
P. 104
DISASTER RECOVERY PLANNING
P. 104
BUSINESS CONTINUITY PLANNING
P. 105
CRISIS MANAGEMENT
P. 106
CHAPTER SUMMARY
P. 107
REVIEW QUESTIONS
P. 108
EXERCISES
P. 109
CASE EXERCISES
P. 110
FINDING NETWORK VULNERABILITIES
P. 113
INTRODUCTION
P. 114
COMMON VULNERABILITIES
P. 114
DEFECTS IN SOFTWARE OR FIRMWARE
P. 114
WEAKNESSES IN PROCESSES AND PROCEDURES
P. 121
SCANNING AND ANALYSIS TOOLS
P. 121
PORT SCANNERS
P. 125
FIREWALL ANALYSIS TOOLS
P. 126
OPERATING SYSTEM DETECTION TOOLS
P. 127
VULNERABILITY SCANNERS
P. 128
PACKET SNIFFERS
P. 133
WIRELESS SECURITY TOOLS
P. 134
PENETRATION TESTING
P. 135
CHAPTER SUMMARY
P. 138
REVIEW QUESTIONS
P. 138
EXERCISES
P. 139
CASE EXERCISES
P. 139
FIREWALL PLANNING AND DESIGN
P. 141
INTRODUCTION
P. 142
IMAGE 4
MISCONCEPTIONS ABOUT FIREWALLS
P. 143
FIREWALLS EXPLAINED
P. 143
AN ANALOGY: OFFICE TOWER SECURITY GUARD
P. 144
FIREWALL SECURITY FEATURES
P. 145
FIREWALL USER PROTECTION
P. 145
FIREWALL NETWORK PERIMETER SECURITY
P. 145
FIREWALL COMPONENTS
P. 146
FIREWALL SECURITY TASKS
P. 147
TYPES OF FIREWALL PROTECTION
P. 152
PACKET FILTERING
P. 152
PAT AND NAT
P. 159
APPLICATION LAYER GATEWAYS
P. 160
FIREWALL CATEGORIES
P. 162
PROCESSING MODE
P. 162
FIREWALL GENERATION
P. 164
FIREWALL STRUCTURES
P. 165
FIREWALL ARCHITECTURES
P. 174
LIMITATIONS OF FIREWALLS
P. 178
CHAPTER SUMMARY
P. 178
REVIEW QUESTIONS
P. 179
EXERCISES
P. 180
CASE EXERCISES
P. 181
PACKET FILTERING
P. 183
INTRODUCTION
P. 184
UNDERSTANDING PACKETS AND PACKET FILTERING
P. 184
PACKET-FILTERING DEVICES
P. 184
ANATOMY OF A PACKET
P. 185
PACKET-FILTERING RULES
P. 187
PACKET-FILTERING METHODS
P. 189
STATELESS PACKET FILTERING
P. 190
STATEFUL PACKET FILTERING
P. 195
FILTERING BASED ON PACKET CONTENT
P. 197
SETTING SPECIFIC PACKET FILTER RULES
P. 197
BEST PRACTICES FOR FIREWALL RULES
P. 197
RULES THAT COVER MULTIPLE VARIATIONS
P. 199
RULES FOR ICMP PACKETS
P. 199
RULES THAT ENABLE WEB ACCESS
P. 201
RULES THAT ENABLE DNS
P. 202
RULES THAT ENABLE FTP
P. 202
RULES THAT ENABLE E-MAIL
P. 203
CHAPTER SUMMARY
P. 205
IMAGE 5
REVIEW QUESTIONS
P. 205
EXERCISES
P. 206
CASE EXERCISES
P. 207
WORKING WITH PROXY SERVERS AND APPLICATION-LEVEL FIREWALLS
P. 209
INTRODUCTION
P. 210
OVERVIEW OF PROXY SERVERS
P. 210
HOW PROXY SERVERS WORK
P. 210
HOW PROXY SERVERS DIFFER FROM PACKET FILTERS
P. 212
SAMPLE PROXY SERVER CONFIGURATIONS
P. 212
GOALS OF PROXY SERVERS
P. 214
CONCEALING INTERNAL CLIENTS
P. 215
BLOCKING URLS
P. 216
BLOCKING AND FILTERING CONTENT
P. 216
E-MAIL PROXY PROTECTION
P. 217
IMPROVING PERFORMANCE
P. 217
ENSURING SECURITY
P. 218
PROVIDING USER AUTHENTICATION
P. 218
REDIRECTING URLS
P. 219
PROXY SERVER CONFIGURATION CONSIDERATIONS
P. 219
PROVIDING FOR SCALABILITY
P. 219
WORKING WITH CLIENT CONFIGURATIONS
P. 219
WORKING WITH SERVICE CONFIGURATIONS
P. 221
CREATING FILTER RULES
P. 221
RECOGNIZING THE SINGLE POINT OF FAILURE
P. 222
RECOGNIZING BUFFER OVERFLOW VULNERABILITIES
P. 222
CHOOSING A PROXY SERVER
P. 222
TRANSPARENT PROXIES
P. 222
NONTRANSPARENT PROXIES
P. 223
SOCKS-BASED PROXIES
P. 223
PROXY SERVER-BASED FIREWALLS COMPARED
P. 224
T.REX OPEN-SOURCE FIREWALL
P. 225
SQUID
P. 225
WINGATE
P. 225
SYMANTEC ENTERPRISE FIREWALL
P. 226
MICROSOFT INTERNET SECURITY & ACCELERATION SERVER
P. 226
REVERSE PROXIES
P. 226
WHEN A PROXY SERVICE ISN T THE CORRECT CHOICE
P. 228
CHAPTER SUMMARY
P. 229
REVIEW QUESTIONS
P. 229
EXERCISES
P. 230
CASE EXERCISES
P. 231
IMAGE 6
FIREWALL CONFIGURATION AND ADMINISTRATION
P. 233
INTRODUCTION
P. 234
ESTABLISHING FIREWALL RULES AND RESTRICTIONS
P. 235
THE ROLE OF THE RULES FILE
P. 235
RESTRICTIVE FIREWALLS
P. 235
CONNECTIVITY-BASED FIREWALLS
P. 236
FIREWALL CONFIGURATION STRATEGIES
P. 237
SCALABILITY
P. 237
PRODUCTIVITY
P. 237
DEALING WITH IP ADDRESS ISSUES
P. 238
APPROACHES THAT ADD FUNCTIONALITY TO YOUR FIREWALL
P. 239
NAT/PAT
P. 239
ENCRYPTION
P. 239
APPLICATION PROXIES
P. 240
VPNS
P. 240
INTRUSION DETECTION AND PREVENTION SYSTEMS
P. 241
ENABLING A FIREWALL TO MEET NEW NEEDS
P. 243
VERIFYING RESOURCES NEEDED BY THE FIREWALL
P. 244
IDENTIFYING NEW RISKS
P. 245
ADDING SOFTWARE UPDATES AND PATCHES
P. 245
ADDING HARDWARE
P. 246
DEALING WITH COMPLEXITY ON THE NETWORK
P. 247
ADHERING TO PROVEN SECURITY PRINCIPLES
P. 248
ENVIRONMENTAL MANAGEMENT
P. 248
BIOS, BOOT, AND SCREEN LOCKS
P. 248
REMOTE MANAGEMENT INTERFACE
P. 249
WHY REMOTE MANAGEMENT TOOLS ARE IMPORTANT
P. 249
SECURITY CONCERNS
P. 250
BASIC FEATURES OF REMOTE MANAGEMENT TOOLS
P. 250
AUTOMATING SECURITY CHECKS
P. 251
CONFIGURING ADVANCED FIREWALL FUNCTIONS
P. 251
DATA CACHING
P. 251
HOT STANDBY REDUNDANCY
P. 252
LOAD BALANCING
P. 253
FILTERING CONTENT
P. 254
CHAPTER SUMMARY
P. 256
REVIEW QUESTIONS
P. 257
EXERCISES
P. 257
CASE EXERCISES
P. 258
ENCRYPTION AND FIREWALLS
P. 259
INTRODUCTION
P. 260
IMAGE 7
FIREWALLS AND ENCRYPTION
P. 260
THE COST OF ENCRYPTION
P. 262
PRESERVING DATA INTEGRITY
P. 262
MAINTAINING CONFIDENTIALITY
P. 262
AUTHENTICATING NETWORK CLIENTS
P. 263
ENABLING VIRTUAL PRIVATE NETWORKS (VPNS)
P. 263
PRINCIPLES OF CRYPTOGRAPHY
P. 263
ENCRYPTION DEFINITIONS
P. 264
CRYPTOGRAPHIC NOTATION
P. 264
ENCRYPTION OPERATIONS
P. 265
USING CRYPTOGRAPHIC CONTROLS
P. 276
E-MAIL SECURITY
P. 277
SECURING THE WEB
P. 277
SECURING AUTHENTICATION
P. 278
ATTACKS ON CRYPTOSYSTEMS
P. 280
MAN-IN-THE-MIDDLE ATTACK
P. 281
CORRELATION ATTACKS
P. 281
DICTIONARY ATTACKS
P. 281
TIMING ATTACKS
P. 282
DEFENDING FROM ATTACKS
P. 282
CHAPTER SUMMARY
P. 283
REVIEW QUESTIONS
P. 283
EXERCISES
P. 284
CASE EXERCISES
P. 285
AUTHENTICATING USERS
P. 287
INTRODUCTION
P. 288
THE AUTHENTICATION PROCESS IN GENERAL
P. 288
HOW FIREWALLS IMPLEMENT THE AUTHENTICATION PROCESS
P. 289
FIREWALL AUTHENTICATION METHODS
P. 290
USER AUTHENTICATION
P. 291
CLIENT AUTHENTICATION
P. 291
SESSION AUTHENTICATION
P. 292
CENTRALIZED AUTHENTICATION
P. 293
KERBEROS
P. 294
TACACS+
P. 295
REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS)
P. 296
TACACS+ AND RADIUS COMPARED
P. 296
PASSWORD SECURITY ISSUES
P. 298
PASSWORDS THAT CAN BE CRACKED
P. 298
PASSWORD VULNERABILITIES
P. 298
LAX SECURITY HABITS
P. 298
IMAGE 8
PASSWORD SECURITY TOOLS
P. 299
ONE-TIME PASSWORD SOFTWARE
P. 299
THE SHADOW PASSWORD SYSTEM
P. 299
OTHER AUTHENTICATION SYSTEMS
P. 300
SINGLE-PASSWORD SYSTEMS
P. 300
ONE-TIME PASSWORD SYSTEMS
P. 300
CERTIFICATE-BASED AUTHENTICATION
P. 301
802.1X WI-FI AUTHENTICATION
P. 302
CHAPTER SUMMARY
P. 303
REVIEW QUESTIONS
P. 303
EXERCISES
P. 304
CASE EXERCISES
P. 305
SETTING UP A VIRTUAL PRIVATE NETWORK
P. 307
INTRODUCTION
P. 308
VPN COMPONENTS AND OPERATIONS
P. 309
VPN COMPONENTS
P. 309
ESSENTIAL ACTIVITIES OF VPNS
P. 313
BENEFITS AND DRAWBACKS OF VPNS
P. 314
VPNS EXTEND NETWORK BOUNDARIES
P. 314
TYPES OF VPNS
P. 315
VPN APPLIANCES
P. 316
SOFTWARE VPN SYSTEMS
P. 317
VPN COMBINATIONS OF HARDWARE AND SOFTWARE
P. 318
COMBINATION VPNS
P. 318
VPN SETUPS
P. 318
MESH CONFIGURATION
P. 318
HUB-AND-SPOKE CONFIGURATION
P. 319
HYBRID CONFIGURATION
P. 321
CONFIGURATIONS AND EXTRANET AND INTRANET ACCESS
P. 321
TUNNELING PROTOCOLS USED WITH VPNS
P. 322
IPSEC/IKE
P. 322
PPTP
P. 323
L2TP
P. 324
PPP OVER SSL/PPP OVER SSH
P. 324
ENABLING REMOTE ACCESS CONNECTIONS WITHIN VPNS
P. 325
CONFIGURING THE SERVER
P. 325
CONFIGURING CLIENTS
P. 326
VPN BEST PRACTICES
P. 327
THE NEED FOR A VPN POLICY
P. 327
PACKET FILTERING AND VPNS
P. 327
AUDITING AND TESTING THE VPN
P. 330
IMAGE 9
CHAPTER SUMMARY
P. 33
REVIEW QUESTIONS
P. 334
EXERCISES
P. 334
CASE EXERCISES
P. 335
CONTINGENCY PLANNING
P. 337
INTRODUCTION
P. 338
WHAT IS CONTINGENCY PLANNING?
P. 339
COMPONENTS OF CONTINGENCY PLANNING
P. 341
BUSINESS IMPACT ANALYSIS
P. 342
INCIDENT RESPONSE PLAN
P. 343
DISASTER RECOVERY PLAN
P. 344
BUSINESS CONTINUITY PLAN
P. 344
INCIDENT RESPONSE: PREPARATION, ORGANIZATION, AND PREVENTION P. 345
PLANNING FOR THE RESPONSE DURING THE INCIDENT
P. 347
PLANNING FOR AFTER THE INCIDENT
P. 349
PLANNING FOR BEFORE THE INCIDENT
P. 349
INCIDENT CLASSIFICATION AND DETECTION
P. 351
CLASSIFYING INCIDENTS
P. 352
DATA COLLECTION
P. 354
DETECTING COMPROMISED SOFTWARE
P. 356
CHALLENGES IN INTRUSION DETECTION
P. 357
INCIDENT REACTION
P. 357
SELECTING AN IR STRATEGY
P. 357
NOTIFICATION
P. 359
DOCUMENTING AN INCIDENT
P. 360
INCIDENT CONTAINMENT STRATEGIES
P. 360
INTERVIEWING INDIVIDUALS INVOLVED IN THE INCIDENT
P. 361
RECOVERING FROM INCIDENTS
P. 361
IDENTIFY AND RESOLVE VULNERABILITIES
P. 362
RESTORE DATA
P. 363
RESTORE SERVICES AND PROCESSES
P. 363
RESTORE CONFIDENCE ACROSS THE ORGANIZATION
P. 363
IR PLAN MAINTENANCE
P. 363
THE AFTER-ACTION REVIEW
P. 363
IR PLAN REVIEW AND MAINTENANCE
P. 365
TRAINING
P. 365
REHEARSAL
P. 365
DATA AND APPLICATION RESUMPTION
P. 366
DISK-TO-DISK-TO-TAPE
P. 366
BACKUP STRATEGIES
P. 366
TAPE BACKUP AND RECOVERY
P. 367
IMAGE 10
REDUNDANCY-BASED BACKUP AND RECOVERY USING RAID
P. 369
DATABASE BACKUPS
P. 371
APPLICATION BACKUPS
P. 372
REAL-TIME PROTECTION, SERVER RECOVERY, AND APPLICATION RECOVERY P. 372
SERVICE AGREEMENTS
P. 377
CHAPTER SUMMARY
P. 378
REVIEW QUESTIONS
P. 379
EXERCISES
P. 379
CASE EXERCISES
P. 380
INTRUSION DETECTION AND PREVENTION SYSTEMS
P. 383
INTRODUCTION
P. 384
INTRUSION DETECTION AND PREVENTION
P. 384
IDPS TERMINOLOGY
P. 385
WHY USE AN IDPS?
P. 387
NETWORK-BASED IDPS
P. 390
HOST-BASED IDPS
P. 394
IDPS DETECTION METHODS
P. 396
IDPS RESPONSE BEHAVIOR
P. 398
SELECTING IDPS APPROACHES AND PRODUCTS
P. 401
STRENGTHS AND LIMITATIONS OF IDPSS
P. 406
DEPLOYMENT AND IMPLEMENTATION OF AN IDPS
P. 407
MEASURING THE EFFECTIVENESS OF IDPSS
P. 415
HONEY POTS, HONEY NETS, AND PADDED CELL SYSTEM
P. 417
TRAP AND TRACE SYSTEMS
P. 419
ACTIVE INTRUSION PREVENTION
P. 420
CHAPTER SUMMARY
P. 420
REVIEW QUESTIONS
P. 421
EXERCISES
P. 422
CASE EXERCISES
P. 422
DIGITAL FORENSICS
P. 425
INTRODUCTION
P. 426
THE DIGITAL FORENSIC TEAM
P. 426
THE FIRST RESPONSE TEAM
P. 427
THE ANALYSIS TEAM
P. 428
DIGITAL FORENSICS METHODOLOGY
P. 430
AFFIDAVITS AND SEARCH WARRANTS
P. 430
ACQUIRING THE EVIDENCE
P. 432
IDENTIFYING SOURCES
P. 432
AUTHENTICATING EVIDENCE
P. 433
COLLECTING EVIDENCE
P. 434
MAINTAINING THE CHAIN OF CUSTODY
P. 447
IMAGE 11
ANALYZING EVIDENCE
P. 449
SEARCHING FOR EVIDENCE
P. 451
REPORTING THE FINDINGS
P. 453
INTERACTING WITH LAW ENFORCEMENT
P. 453
ANTI-FORENSICS
P. 455
CHAPTER SUMMARY
P. 456
REVIEW QUESTIONS
P. 456
EXERCISES
P. 457
CASE EXERCISE
P. 457
GLOSSARY
P. 459
INDEX
P. 473
TABLE OF CONTENTS PROVIDED BY BLACKWELL S BOOK SERVICES AND R.R. BOWKER.
USED WITH PERMISSION.
|
any_adam_object | 1 |
author_GND | (DE-588)173003621 |
building | Verbundindex |
bvnumber | BV037393179 |
ctrlnum | (OCoLC)610748977 (DE-599)GBV567048381 |
edition | 2nd ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01538nam a2200361 c 4500</leader><controlfield tag="001">BV037393179</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110526 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110511s2009 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435420160</subfield><subfield code="c">(pbk) : £47.99</subfield><subfield code="9">1-435-42016-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435420168</subfield><subfield code="c">(pbk) : £47.99</subfield><subfield code="9">978-1-435-42016-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)610748977</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV567048381</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guide to firewalls and network security :intrusion detection and VPNs</subfield><subfield code="c">Michael E. Whitman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass.</subfield><subfield code="b">Course Technology/Cengage Learning</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 496 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whitman, Michael E.</subfield><subfield code="d">1964-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)173003621</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022546026&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022546026</subfield></datafield></record></collection> |
id | DE-604.BV037393179 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:23:21Z |
institution | BVB |
isbn | 1435420160 9781435420168 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022546026 |
oclc_num | 610748977 |
open_access_boolean | |
owner | DE-522 |
owner_facet | DE-522 |
physical | XXIV, 496 S. Ill., graph. Darst. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Course Technology/Cengage Learning |
record_format | marc |
spelling | Guide to firewalls and network security :intrusion detection and VPNs Michael E. Whitman 2nd ed. Boston, Mass. Course Technology/Cengage Learning 2009 XXIV, 496 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes index. - Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004 Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Whitman, Michael E. 1964- Sonstige (DE-588)173003621 oth GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022546026&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Guide to firewalls and network security :intrusion detection and VPNs Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | Guide to firewalls and network security :intrusion detection and VPNs |
title_auth | Guide to firewalls and network security :intrusion detection and VPNs |
title_exact_search | Guide to firewalls and network security :intrusion detection and VPNs |
title_full | Guide to firewalls and network security :intrusion detection and VPNs Michael E. Whitman |
title_fullStr | Guide to firewalls and network security :intrusion detection and VPNs Michael E. Whitman |
title_full_unstemmed | Guide to firewalls and network security :intrusion detection and VPNs Michael E. Whitman |
title_short | Guide to firewalls and network security :intrusion detection and VPNs |
title_sort | guide to firewalls and network security intrusion detection and vpns |
topic | Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computersicherheit Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022546026&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT whitmanmichaele guidetofirewallsandnetworksecurityintrusiondetectionandvpns |