Text
Inside network perimeter security
Terdapat bibliografi dan indeks.
Table of Contents:
I. The Essentials of Network Perimeter Security
1. Perimeter Security Fundamentals
2. Packet Filtering
3. Stateful Firewalls
4. Proxy Firewalls
5. Security Policy
II. Fortifying the Security Perimeter
6. The Role of a Router
7. Virtual Private Networks
8. Network Intrusion Detection
9. Host Hardening
10. Host Defense Components
11. Intrusion Prevention Systems
III. Designing a Secure Network Perimeter
12. Fundamentals of Secure Perimeter Design
13. Separating Resources
14. Wireless Network Security
15. Software Architecture
16. VPN Integration
17. Tuning the Design for Performance
18. Sample Designs
IV. Maintaining and Monitoring Perimeter Security
19. Maintaining a Security Perimeter
20. Network Log Analysis
21. Troubleshooting Defense Components
22. Assessment Techniques
23. Design Under Fire
24. A Unified Security Perimeter: The Importance of Defense in Depth
V. Appendixes
A. Cisco Access List Sample Configurations
B. Crypto 101
No other version available