Beschreibung
Building on the existing Handbook of Data Communications and Networks, and The Complete Handbook of the Internet, this book covers every aspect of computer and network security. Includes an analysis of the physical connection and data transfer over networks, the security strengths and weaknesses of network protocols, common session protocols (such as HTTP and FTP), the most popular network operating systems, network security devices, mobile networks, and an in-depth analysis of the principles and implementation of public-key encryption. The book is packed with practical security examples, advice, tips and techniques, including usable router programming commands and screen shots showing key security principles.
Autorenportrait
InhaltsangabeA Network and OS principles. 1. OSI model. 2. Network topology/network elements. 3. Network architectures. 4. HDLC. 5. Ethernet. 6. ATM. 7. ADSL. 8. Wireless networks. 9. TCP. 10. IP. 11. Session Protocols. 12. Peer-to-peer protocols. 13. Routers. 14. Router Programming and ACLs. B Security devices. 1. Switches and VLANs. 2. Firewalls. 3. VPNs. 4. Proxies. 5. Application-level gateways. 6. Ring-fenced firewalls. 7. Encrypted tunnel. 8. Filtering routers. 9. Security over VPNs. 10. Firewall tools. 11. Network tools. 12. System monitoring tools. 13. Smartcards and Biometrics. C Encryption. 1. Encryption and the OSI model. 2. Legal issues. 3. Random number generators. 4. Cryptography. 5. Basic encryption principles. 6. Message hash. 7. Private-key methods. 8. Public-key encryption methods. 9. Authentication. 10. Internet security. 11. AAA methods. 12. Digital Signatures. 13. PPK. 14. Digital Certificates. 15. Protecting Private Keys. 16. Certificate Practice Statements. 17. PKI. 18. SSH. 19. S-MIME. D System attacks. 1. Classification. 2. Intruder profiles. 3. Tools. 4. Physical layer methods. 4. Data link layer methods. 5. IP methods. 6. TCP methods. 7. Social Engineering. 8. Denial-of-service. 9. Remote Access. 10. Passwords. 11. SMTP. 12. Mail. 13. Trusted hosts. 14. Configuration/library. 15. TFTP. 16. NIS. 17. FTP. 18. NFS. 19. SNMP. 20. Wins. 21. DNS. 22. DHCP. 23. Routing protocols. 24. Viruses. 25. Worms. 26. RFCs on security. E Network Operating systems and servers. 1. Windows domains. 2. Novell/NDS. 3. UNIX/LINUX. 4. WWW server configuration. 5. Telnet server configuration. 6. FTP server configuration. 7. File server configuration. 8. Domain server configuration. 9. DNS server configuration. 10. Address server configuration. 11. Email server configuration. F Security policies. 1. Risk management/assessment. 2. Auditing. 3. Finger-printing. 4. Forensic computing. 5. Distributed security policies. 6. Tiered security. 7. Secure network architecture. 8. Security assessments. 9. Fall-back systems. 10. Data recovery. 11. Cyber Terrorism. 12. Network attack scenarios. 13. Network attack case studies. G. Mobile Networks. 1. Wireless networks. 2. GPRS/GSM/3G. 3. Location services. 4. WEP. 5. Spread spectrum. 6. Military systems. 7. Agent-based systems. 8. Mobile Agents. 9. Ad-hoc networks. 10. Routing over ad-hoc networks. 11. Transport protocols for wireless networks. H Implementation. 1. Secure software design. 2. Intrusion Detection systems. 3. IPSec Security. 4. Crypto Access Lists. 5. Secure Sockets. 6. Anti-replay methods. 7. Internet Key Exchange. 8. IOS Firewalls/Context-based Access Control. 9. IOS Intrusion Detection. 10. RADIUS/ TACACS+/ Kerberos. 11. PPP/SLIP/CHAP. 12. Java security. 13.NET security. 14.NET v. Java