English Deutsch Français 简体中文 繁體中文
Book123, Download eBooks for Free - Anytime! Submit your article

Categories

Share With Friends



Like Book123?! Give us +1

Archive by Date

Search Tag

Newest

Useful Links


Technical Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems

Posted on 2010-04-28




Name:Technical Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems
ASIN/ISBN:0735712328
Author:Stephen Northcutt, Karen Frederick, Scott Winters, Lenny Zeltser, Ronald W. Ritchey
Publisher:Sams (2002)
Pages:Paperback, 712 pages
File size:9 Mb
   Technical Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems


Author: Stephen Northcutt, Karen Frederick, Scott Winters, Lenny Zeltser, Ronald W. Ritchey


Publisher: Sams (2002)


Binding: Paperback, 712 pages


pricer: $49.99


ISBN-10: 0735712328


editorialreviews

Submarines handle awkwardly on the surface of the sea; airplanes are cumbersome when taxiing. Both modes of operation, however, are design requirements. Organizational computer networks have a similar requirement: they have to interface with other networks (thereby forming the Internet) in order to be useful. How network engineers manage their networks' perimeters has a lot to do with their usefulness, cost effectiveness, and--perhaps above all--security. Inside Network Perimeter Security concerns itself with this latter aspect of the connection to the outside world. It's carefully researched, cleverly written, and full of references to recent exploits and, more importantly, the trends they represent. The best details on emerging hack attacks will always be found online. This book takes a longer view, evaluating offensive and defensive technologies and offering well-reasoned advice on how to keep a network secure now and in the future.

Readers familiar with the previous work of the authors--particularly the highly respected Stephen Northcutt--will recognize the style here. It doesn't aim to teach you how to do much in particular--there are a few procedures, and some Cisco Internetwork Operating System (IOS) command listings--but rather tries to show how to think about networks and the data that comes from them. In a typical section, the authors analyze a log from Tiny Personal Firewall. They highlight the facts that are present in the log and the inferences that can be made from them. A similar style helps you master software tools and make network design decisions. This book is perfect for a network engineer wanting to improve his or her security skills for both design and administration purposes. --David Wall

Topics covered: How to design networks' borders for maximum security, and how to monitor them for unauthorized activity. After an introduction to firewalls, packet filtering, and access lists, the authors explain how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. A large section has to do with security-conscious design, both for green field projects and existing networks that need expansion or improvement.




Buy Book at Lowest Price on Amazon




failed

Rating:

2.5 out of 5 by

 
Download Links
  ServerStatus
  Direct Download Link 1Alive
  Direct Download Link 2Alive
  Download Link (Download Link 1)Alive


Buy This Book at Best Price >>

Like this article?! Give us +1:

Related Articles


Technical Inside Network Perimeter Security (2nd Edition) (Inside)

Technical Inside Network Perimeter Security (2nd Edition) (Inside)

Author: Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent, Ronald W. RitcheyPublisher: SamsPublish Date: 11 March, 2005ISBN: 0672327376

Technical Cisco Security Professional%27s Guide to Secure Intrusion Detection Systems

Technical Cisco Security Professional%27s Guide to Secure Intrusion Detection Systems

Author: Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido DubrawskyPublisher: SyngressPublish Date: July, 2003ISBN: 1932266690

Study Cisco Security Intrusion Detection Systems CSIDS Student Guide V4.1

Study Cisco Security Intrusion Detection Systems CSIDS Student Guide V4.1

Technical Syngress Cisco Security Professionals Guide To Secure Intrusion Detection Systems

Technical Syngress Cisco Security Professionals Guide To Secure Intrusion Detection Systems

Technical Cisco Security Intrusion Detection Systems CSIDS Student Guide V4 1

Technical Cisco Security Intrusion Detection Systems CSIDS Student Guide V4 1

Internet/Networking Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Internet/Networking Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Share this page with your friends now!
Text link
Forum (BBCode)
Website (HTML)
Tags:
Technical   Inside   Network   Perimeter   Security   Definitive   Guide   Firewalls   VPNs   Routers   Intrusion   Detection   Systems  
 

DISCLAIMER:

This site does not store Technical Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems on its server. We only index and link to Technical Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems provided by other sites. Please contact the content providers to delete Technical Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems if any and email us, we'll remove relevant links or contents immediately.

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?

Sign In | Not yet a member?