Designing network security
著者
書誌事項
Designing network security
Macmillan Technical Publishing , Cisco Systems, c1999
大学図書館所蔵 全4件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and index
"A practical guide to creating a secure network infrastructure" - cover
内容説明・目次
内容説明
A practical guide to creating a secure network infrastructure
Understand basic cryptography and security technologies
Identify the threats and common attacks to a network infrastructure
Learn how to create a security policy
Find out how to recover from a security breach
Study specific implementation scenarios for securing your network environment
Designing Network Security is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.
You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and some emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the dial-in environment.
This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
目次
I. SECURITY FUNDAMENTALS.
1. Basic Cryptography.
2. Security Technologies.
3. Export Controls on Cryptography.
II. THE CORPORATE SECURITY POLICY.
4. Threats in an Enterprise Network.
5. Considerations for a Site Security Policy.
6. Design and Implementation of the Corporate Security Policy.
7. Incident Handling.
III. PRACTICAL IMPLEMENTATION.
8. Securing the Corporate Network Infrastructure.
9. Securing Internet Access.
10. Securing Dial-In Access.
IV. APPENDICES.
Appendix A: Sources of Technical Information.
Appendix B: Reporting and Prevention Guidelines: Industrial Espionage and Network Intrusions.
Appendix C: Port Numbers.
Glossary.
Index.
「Nielsen BookData」 より