Cisco network security (Record no. 12158)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06000cam a22002054a 4500 |
001 - CONTROL NUMBER | |
control field | 12453642 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200901100331.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 010627s2002 njua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0130915181 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780130915184 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 21 |
Item number | P6351 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pike, James. |
245 10 - TITLE STATEMENT | |
Title | Cisco network security |
Statement of responsibility, etc | / James Pike. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Upper Saddle River, NJ : |
Name of publisher, distributor, etc | Prentice Hall, |
Date of publication, distribution, etc | 2002 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvi, 302 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Understanding Security Risk and Threats. Technology Weaknesses. Protocol. Operating Systems. Networking Equipment. Firewall "Holes". Configuration Weaknesses. Policy Weaknesses. Sources of Security Threats. Thrill Seekers and Adventurers. Competitors. Thieves. Enemies or Spies. Hostile Employees. Hostile Former Employer. Other Employee Sources. Threats to Network Security. Electronic Eavesdropping. Denial of Service. Unauthorized Access. Session Replay. Session Hijacking. Impersonation. Malicious Destruction. Repudiation. Viruses, Trojan Horses, and Worms. Rerouting. What Are We To Do? What Needs Protection? What Is the Nature of the Risk? What Kind of Protection Is Necessary? How Much Can You Afford to Spend?2. Security Architecture. Goals of the Security Policy. Confidentiality and Privacy of Data. Availability of the Data. Integrity of the Data. Identity Authentication and Authorization. Nonrepudiation. Physical Security. Cabling. Switches. Routers. Basic Network Security. Passwords. Network Security Solutions. Perimeter Routers-First Layer of Defense. Firewalls-Perimeter Reinforcement. Virtual Private Networks. Data Privacy and Integrity. Vulnerability Assessment. Intrusion Detection. Access Controls and Identity. Security Policy Management and Enforcement.3. First Line of Defense-The Perimeter Router. Passwords. Privileged Users. Basic Users. Disable EXEC-Mode. Establish a Line-Specific Password. Establish User-Specific Passwords. Limit Access Using Access Lists as Filters. Other Issues. Router Services and Protocols. Simple Network Management Protocol. HTTP. TCP/IP Services. Disable IP Source Route. Disable Non-Essential TCP and UDP Services. Disable the Finger Service. Disable Proxy ARP. Disable Directed Broadcasts. Disable the Cisco Discovery Protocol. Disable ICMP Redirects. Disable the Network Time Protocol. Disable ICMP Unreachables Messages. Traffic Management. Access Control Lists (ACL). Router-Based Attack Protection. Routing Protocols. Audit Trails and Logging.4. Firewalls. The Protocols of the Internet. IP-The Internet Protocol. TCP-The Transmission Control Protocol. UDP-The User Datagram Protocol. TCP and UDP Ports. What Is a Network Firewall? What Kind of Protection Does a Firewall Provide? Protection and Features a Firewall Can Provide. What a Firewall Doesn't Protect Against. Firewall Design Approaches. Network Level Firewalls. Application Layer Firewalls. Network Design with Firewalls. The Classic Firewall Design. The Contemporary Design. Router-Based Firewalls.5. The Cisco Secure PIX Firewall. Security Levels. The Adaptive Security Algorithm. Network Address Translation. PIX Firewall Features. Defense Against Network Attacks. Special Applications and Protocols. Controlling Traffic through the PIX Firewall. Controlling Inbound Traffic with Conduits. Cut-Through-Proxy. AAA Support via RADIUS and TACACS+.6. Configuring the PIX Firewall. Getting Started. Provision for Routing. Configuring the PIX Firewall. Identifying the Interfaces. Permitting Access from the Inside. Establish PIX Firewall Routes. Permitting Access from the Outside. Testing and Remote Administration. Controlling Outbound Access. Java Applet Filtering. Authentication and Authorization. Inbound Connections. Outbound Connections. Logging Events. Syslog. Standby PIX Firewalls with Failover.7. Router-Based Firewalls. Access Lists. Standard Access Lists. Extended Access Lists. Guidelines for Access Lists. Cisco Secure Integrated Software. Cisco Secure Integrated Software Architecture. CBAC and Stateful Packet Filtering. CBAC Supported Applications. Other Restrictions of CBAC. CSIS-Other Features. Configuring CBAC. Other Considerations.8. Introduction to Encryption Techniques. Symmetric Key Encryption. Data Encryption Standard. Advanced Encryption Standard and Others. Key Management. Asymmetric Key Encryption. How Public-Key Encryption Works. Comparing Symmetric versus Asymmetric Methods. The Diffie-Hellman Algorithm. Perfect Forward Secrecy. RSA Public-Key Encryption. Message Authentication Codes.9. Introduction to IPSec. Where to Apply Encryption. Data Link Layer. Network Layer. Transport Layer. Application Layer. Goals. Overview of IPSec. IPSec Details. AH-The Authentication Header. ESP-The Encapsulating Security Payload. Modes. SA, SPI, and SPD Defined. Key Management. Internet Key Exchange. IKE, ISAKMP, OAKLEY, and the DOI. Basic Key Exchange. IKE Phase 1. IKE Phase 2. IPSec Documentation.10. Configuring IPSec. Step 1-Planning for IPSec. Step 2-Configuring Internet Key Exchange (IKE). Configuring Manual Keys. Dynamic Key Management. PFS and SA Lifetimes. Other IKE Configuration Options. Command Syntax for IKE. Step 3-Defining Transform Sets. Configuring Transform Sets. Step 4-Create Crypto Access lists. Step 5-Creating Crypto Maps. Step 6-Applying Crypto Maps to an Interface. Step 7-Test and Verify. Sample Configurations. Sample Configuration #1-IPSec Manual Keys. Sample Configuration #2-IKE with PreShared Key.11. Virtual Private Networks-VPNs. Motivation for VPNs. Why VPNs. VPN Applications. VPN Technologies. PPTP. L2TP. IPSec. Authentication Limitations.12. Cisco's Other Security Products. Access Control. Vulnerability Assessment. Phase One-Network Mapping. Phase Two-Data Collection. Phase Three-Data Analysis. Phase Four-Vulnerability Confirmation. Phase Five-Data Presentation and Navigation. Phase Six-Reporting. Intrusion Detection. Reacting to Alerts.Index. |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 19.11.2018 | U.E.24149 | 005.8 P6351 | T9634 | 10.10.2023 | 19.11.2018 | Books |