Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Inside network perimeter security
Bookmark Share

Text

Inside network perimeter security

Northcutt, Stephen - Personal Name; Zeltser, Lenny - Personal Name; Winters, Scott - Personal Name; Kent, Karen - Personal Name; Ritchey, Ronald W. - Personal Name;

Terdapat bibliografi dan indeks.

Table of Contents:
I. The Essentials of Network Perimeter Security
1. Perimeter Security Fundamentals
2. Packet Filtering
3. Stateful Firewalls
4. Proxy Firewalls
5. Security Policy

II. Fortifying the Security Perimeter
6. The Role of a Router
7. Virtual Private Networks
8. Network Intrusion Detection
9. Host Hardening
10. Host Defense Components
11. Intrusion Prevention Systems

III. Designing a Secure Network Perimeter
12. Fundamentals of Secure Perimeter Design
13. Separating Resources
14. Wireless Network Security
15. Software Architecture
16. VPN Integration
17. Tuning the Design for Performance
18. Sample Designs

IV. Maintaining and Monitoring Perimeter Security
19. Maintaining a Security Perimeter
20. Network Log Analysis
21. Troubleshooting Defense Components
22. Assessment Techniques
23. Design Under Fire
24. A Unified Security Perimeter: The Importance of Defense in Depth

V. Appendixes
A. Cisco Access List Sample Configurations
B. Crypto 101


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 NOR i
b0001906
Available but not for loan - Missing
#
Perpustakaan Poltek SSN (Rak 000) 005.8 NOR i/2
b0001908
Available - Available
Detail Information
Series Title
--
Call Number
005.8 NOR i
Publisher
Indianapolis : Sams Publishing., 2005
Collation
xxxii, 734 hal.; ilus.; 23 cm
Language
English
ISBN/ISSN
0672327376
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
Second edition
Subject(s)
Computer security
Komputer -- Pengamanan
Computer networks -- Security measures
Specific Detail Info
--
Statement of Responsibility
Stephen Northcutt, et al
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?