Atjaunināt sīkdatņu piekrišanu

Network Security, Firewalls And Vpns 3rd Revised edition [Mīkstie vāki]

  • Formāts: Paperback / softback, 500 pages, weight: 822 g
  • Izdošanas datums: 29-Oct-2020
  • Izdevniecība: Jones and Bartlett Publishers, Inc
  • ISBN-10: 1284183653
  • ISBN-13: 9781284183658
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 106,73 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 500 pages, weight: 822 g
  • Izdošanas datums: 29-Oct-2020
  • Izdevniecība: Jones and Bartlett Publishers, Inc
  • ISBN-10: 1284183653
  • ISBN-13: 9781284183658
Citas grāmatas par šo tēmu:
"Network Security, Firewalls, and VPNs is written for a course on Network Security and Perimeter Defense, with special emphasis placed on Firewalls and VPNs - two key tools for securing networks. It is currently divided into three parts - Part 1 : Foundations of Network Security, Part 2 : Technical Overview of Network Security, Firewalls, and VPNs, and Part 3 : Implementation, Resources, and the Future"--

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIESFully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.Key Features:-Introduces the basics of network security—exploring the details of firewall security and how VPNs operate-Illustrates how to plan proper network security to combat hackers and outside threats-Discusses firewall configuration and deployment and managing firewall security-Identifies how to secure local and internet communications with a VPNInstructor Materials for Network Security, Firewalls, VPNs include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts About the SeriesThis book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.

A&P Binding: PB Saleable
Preface xix
Acknowledgments xxi
About the Authors xxiii
PART 1 Foundations of Network Security
1(130)
Chapter 1 Fundamentals Of Network Security
3(28)
What Is Network Security?
4(3)
What Is Trust?
5(1)
Who---or What---Is Trustworthy?
6(1)
What Are Security Objectives?
6(1)
What Are You Trying to Protect?
7(4)
Seven Domains of a Typical IT Infrastructure
8(3)
Goals of Network Security
11(1)
How Can You Measure the Success of Network Security?
11(1)
Why Are Written Network Security Policies Important?
12(1)
Planning for the Worst
12(1)
Who Is Responsible for Network Security?
12(1)
Enhancing the Security of Wired Versus Wireless LAN Infrastructures
13(1)
Internal and External Network Issues
14(3)
Common Network Security Components Used to Mitigate Threats
17(7)
Hosts and Nodes
17(1)
Firewalls
17(1)
Virtual Private Networks
18(1)
Proxy Servers
18(1)
Network Address Translation
19(3)
The Domain Name System
22(1)
Directory Services
22(1)
Intrusion Detection Systems and Intrusion Prevention Systems
23(1)
Network Access Control
24(1)
TCP/IP Basics
24(4)
OSI Reference Model
24(2)
Sub-Protocols
26(1)
Headers and Payloads
27(1)
Filtering on Addresses
27(1)
Chapter Summary
28(1)
Key Concepts And Terms
29(1)
Chapter 1 Assessment
30(1)
Chapter 2 Network Security Threats
31(36)
Hackers and Their Motivation
32(4)
Favorite Targets of Hackers
36(1)
Threats from Internal Personnel and External Entities
36(2)
The Hacking Process
38(6)
Reconnaissance
39(1)
Scanning
39(2)
Enumeration
41(2)
Attacking
43(1)
Post-Attack Activities
43(1)
Common IT Infrastructure Threats
44(2)
Hardware Failures and Other Physical Threats
44(1)
Natural Disasters
45(1)
Accidents
45(1)
Malicious Code (Malware)
46(3)
Advanced Persistent Threat
48(1)
Fast Growth and Overuse
49(1)
Wireless Versus Wired
50(1)
Eavesdropping
50(1)
Hijack and Replay Attacks
51(1)
Insertion Attacks
52(1)
Fragmentation Attacks
53(1)
Buffer Overflows
53(1)
Session Hijacking, Spoofing, and Man-in-the-Middle Attacks
54(3)
Session Hijacking
54(1)
Spoofing Attacks
55(1)
Man-in-the-Middle Attacks
56(1)
Covert Channels
57(2)
Network and Resource Availability Threats
59(3)
Denial of Service (DoS)
59(1)
Distributed Denial of Service (DDoS)
60(2)
Hacker Tools
62(1)
Social Engineering
62(1)
Chapter Summary
63(1)
Key Concepts And Terms
64(1)
Chapter 2 Assessment
65(2)
Chapter 3 Common Network Topologies End Infrastructures
67(30)
What Is a Network Topology?
68(1)
Types of Network Devices
68(8)
What Differentiates Logical and Physical Topologies?
76(8)
Types of Physical Topologies
77(4)
Logical Topology
81(2)
Creating Logical Topologies
83(1)
Differences Between Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)
84(3)
IPSec and IPv6
86(1)
Examples of Network Infrastructures and Related Security Concerns
87(8)
Workgroups
87(2)
SOHO Networks
89(1)
Client/Server Networks
89(1)
LAN Versus WAN
90(1)
Thin Clients and Terminal Services
91(1)
Remote Control, Remote Access, and VPN
91(2)
Boundary Networks
93(2)
Chapter Summary
95(1)
Key Concepts And Terms
95(1)
Chapter 3 Assessment
96(1)
Chapter 4 Network Design Considerations
97(34)
Network Design and Defense in Depth
98(4)
Achieving Defense in Depth through Layering
99(2)
Planning for Scalability
101(1)
Working with Senior Management
102(1)
Protocols
102(2)
Common Types of Addressing
104(2)
IPv6
106(1)
Controlling Communication Pathways
106(4)
Router Configuration
107(1)
Encrypted Protocols
107(1)
Physical Access Management
107(1)
Filtering
108(2)
Intrusion Detection Systems and Intrusion Prevention Systems
110(3)
Hardening Systems
113(1)
Equipment Selection
114(1)
Authentication, Authorization, and Accounting
115(3)
Communication Encryption
118(1)
Hosts: Local-Only or Remote and Mobile
118(2)
Redundancy
120(1)
Endpoint Security
121(4)
Clients
121(1)
Servers
122(1)
Routers
123(1)
Switches
124(1)
Firewalls and Proxies
124(1)
Risk Assessment and Management
125(1)
What Are Zones of Risk?
126(2)
Chapter Summary
128(1)
Key Concepts And Terms
128(1)
Chapter 4 Assessment
129(2)
PART 2 Securing the Perimeter with Firewalls
131(120)
Chapter 5 Firewall Fundamentals
133(40)
What Is a Firewall?
134(7)
What Firewalls Cannot Do
138(3)
Why Do You Need a Firewall?
141(2)
How Firewalls Work and What Firewalls Do
143(5)
Types of Firewalls
148(2)
Individual and SOHO Firewall Options
150(7)
Managing the Firewall on an ISP Connection Device
152(1)
Converting a Home Router into a Firewall
153(4)
Uses for Host Software Firewalls
157(3)
Examples of Software Firewall Products
157(1)
Using Windows 10's Host Software Firewall
158(2)
Using a Linux Host Software Firewall
160(1)
Uses for Commercial Software Network Firewalls
160(1)
Uses for Hardware/Appliance Firewalls
161(1)
Next-Generation Firewalls
162(1)
What Are Virtual Firewalls?
162(1)
Dual-Homed and Triple-Homed Firewalls
163(1)
Ingress and Egress Filtering
164(1)
Types of Filtering
164(3)
Static Packet Filtering
164(1)
Stateful Inspection and Dynamic Packet Filtering
165(1)
Network Address Translation
166(1)
Application Proxy
166(1)
Circuit Proxy
167(1)
Content Filtering
167(1)
Selecting the Right Firewall for Your Needs
167(2)
The Difference Between Buying and Building a Firewall
169(1)
Chapter Summary
170(1)
Key Concepts And Terms
170(1)
Chapter 5 Assessment
171(2)
Chapter 6 Firewall Implementation
173(18)
Examining Your Network and Its Security Needs
174(3)
What to Protect and Why
174(1)
Preserving Privacy
175(2)
Proper Firewall Implementation Procedure
177(3)
Constructing, Configuring, and Managing a Firewall
180(1)
pfSense
180(1)
pfSense Requirements
181(1)
Planning a Firewall Implementation with pfSense
182(1)
Firewalling a Small Organization: Packet Filtering or Application-Level Firewall, a Proxy Implementation
182(1)
Firewalling Medium and Large Organizations: Application-Level Firewall and Packet Filtering, a Hybrid System
182(1)
Firewalling in a Subnet Architecture
183(1)
Installing the pfSense Firewall
183(3)
Configuring a Firewall with pfSense
186(1)
Elements of Firewall Deployment
186(1)
Testing and Troubleshooting
187(1)
Chapter Summary
188(1)
Key Concepts And Terms
189(1)
Chapter 6 Assessment
189(2)
Chapter 7 Firewall Deployment Considerations
191(32)
Common Security Strategies for Firewall Deployments
192(10)
Security Through Obscurity
192(2)
Least Privilege
194(1)
Simplicity
195(1)
Defense in Depth
195(1)
Diversity of Defense
196(3)
Chokepoint
199(1)
Weakest Link
199(1)
Fail-Safe
200(1)
Forced Universal Participation
200(2)
Authentication, Authorization, and Accounting
202(2)
Placement of Network Hardware Firewalls
204(1)
Benefit and Purpose of Reverse Proxy
205(1)
Use and Benefit of Port Forwarding
206(1)
Considerations for Selecting a Bastion Host OS
207(1)
Monitoring and Logging
208(2)
Understanding and Interpreting Firewall Logs and Alerts
210(4)
Intrusion Detection Systems and Intrusion Prevention Systems
214(1)
Security Event and Information Management
215(1)
Evaluating Needs and Solutions in Designing Security
216(2)
What Happens When Security Gets in the Way of Doing Business?
218(1)
Chapter Summary
219(1)
Key Concepts And Terms
220(1)
Chapter 7 Assessment
220(3)
Chapter 8 Configuring Firewalls
223(28)
Firewall Rules
224(3)
Inbound and Outbound Communications
226(1)
Access Control Lists
227(1)
Composing Firewall Rules
227(5)
Ordering Firewall Rules
232(2)
What Should You Allow and What Should You Block?
234(2)
Essential Elements of a Firewall Policy
236(2)
Limitations of Firewalls
238(2)
Improving Performance
240(2)
The Downside of Encryption with Firewalls
242(2)
Firewall Enhancements
244(1)
Management Interfaces
245(3)
Chapter Summary
248(1)
Key Concepts And Terms
248(1)
Chapter 8 Assessment
249(2)
PART 3 Establishing Remote Access with VPNs
251(100)
Chapter 9 Vpn Fundamentals
253(30)
What Is a Virtual Private Network?
254(5)
What Are the Benefits of Deploying a VPN?
259(2)
What Are the Limitations of a VPN?
261(2)
What Are Effective VPN Policies?
263(1)
VPN Deployment Models and Architecture
263(4)
VPN Deployment Models
263(2)
VPN Architectures
265(2)
Tunnel Versus Transport Mode
267(1)
The Relationship Between Encryption and VPNs
268(10)
Symmetric Cryptography
269(1)
Asymmetric Cryptography
270(4)
Hashing
274(1)
Establishing VPN Connections with Cryptography
275(3)
Digital Certificates
278(1)
What Is VPN Authentication?
278(1)
What Is VPN Authorization?
279(1)
Chapter Summary
280(1)
Key Concepts And Terms
281(1)
Chapter 9 Assessment
281(2)
Chapter 10 Vpn Management
283(26)
VPN Management Best Practices
284(6)
Build in Redundancy
285(1)
Choose the Right VPN Product for Your Environment
285(1)
Develop a VPN Policy
286(1)
Prohibit Split Tunneling
286(1)
Ensure Client Security
286(1)
Practice Vulnerability Management
287(1)
Use Multifactor Authentication
288(1)
Document Your Implementation Plan
288(1)
Monitor VPN Availability
288(1)
Perform Regular Reviews, Backups, and Updates
289(1)
Developing a VPN Policy
290(1)
Developing a VPN Deployment Plan
291(5)
Bypass Deployment
292(1)
Internally Connected Deployment
293(1)
DMZ-Based Implementation
294(2)
VPN Threats and Exploits
296(4)
Commercial Versus Open-Source VPNs
300(1)
Differences Between Personal and Enterprise VPNs
301(1)
Balancing Anonymity and Privacy
301(1)
Protecting VPN Security to Support Availability
301(1)
The Importance of User Training
302(1)
VPN Troubleshooting
303(4)
Chapter Summary
307(1)
Key Concepts And Terms
308(1)
Chapter 10 Assessment
308(1)
Chapter 11 Vpn Technologies
309(18)
Differences Between Software and Hardware Solutions
310(2)
Software VPNs
310(1)
Hardware VPNs
311(1)
Differences Between Layer 2 and Layer 3 VPNs
312(1)
Internet Protocol Security (IPSec)
312(2)
Layer 2 Tunneling Protocol (L2TP)
314(1)
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
315(3)
SSL/TLS and VPNs
317(1)
Secure Shell (SSH) Protocol
318(2)
Establishing Performance and Stability for VPNs
320(2)
Performance
320(1)
Stability
321(1)
Using VPNs with Network Address Translation (NAT)
322(1)
Types of Visualization
323(2)
Desktop Virtualization
323(1)
SSL VPN Visualization
324(1)
Chapter Summary
325(1)
Key Concepts And Terms
325(1)
Chapter 11 Assessment
325(2)
Chapter 12 Vpn Implementation
327(24)
Operating System-Based VPNs
328(2)
VPN Appliances
330(1)
Configuring a Typical VPN Appliance
331(1)
Client-Side Configuration
331(1)
Remote Desktop Protocol
331(2)
Using Remote Control Tools
333(1)
Using Remote Access
333(2)
The Technology for Remote Use
334(1)
Choosing Between IPSec and SSL/TLS Remote Access VPNs
335(1)
Remote Desktop Services
335(1)
RD RemoteApp
335(1)
RD Web Access
335(1)
RDS and Hosted Services
336(1)
Microsoft DirectAccess
336(1)
DMZ, Extranet, and Intranet VPN Solutions
337(2)
Intranet VPNs
337(1)
Extranet VPNs
338(1)
Internet Cafe VPNs
339(1)
Online Remote VPN Options
339(1)
Security
339(1)
Wake-on-LAN Support
339(1)
File Sharing
340(1)
Remote Printing
340(1)
Mac and Mobile Device Support
340(1)
The Tor Application
340(1)
Planning a VPN Implementation
341(6)
Download and Verify Installation Files
342(1)
Installation Tips
342(1)
Configuring OpenVPN
342(2)
Running OpenVPN
344(1)
Testing and Troubleshooting
344(2)
OpenVPN Private Tunnel
346(1)
VPN Implementation Best Practices
347(1)
Chapter Summary
348(1)
Key Concepts And Terms
348(1)
Chapter 12 Assessment
348(3)
PART 4 Implementing Network Security
351(76)
Chapter 13 Firewall Security Management
353(20)
Best Practices for Firewall Management
354(3)
Security Measures in Addition to a Firewall
357(1)
Mitigating Firewall Threats and Exploits
358(3)
Concerns Related to Tunneling Through or Across a Firewall
361(2)
Testing Firewall Security
363(1)
Important Tools for Managing and Monitoring a Firewall
364(2)
Troubleshooting Firewalls
366(3)
Detecting Firewall Threats and Responding to Incidents
369(1)
Chapter Summary
370(1)
Key Concepts And Terms
370(1)
Chapter 13 Assessment
370(3)
Chapter 14 Best Practices For Network Security Management
373(32)
Essentials of Network Security Management
374(4)
Network Security Management Tools
378(3)
Security Plan and Security Policy
379(1)
Security Checklist
380(1)
Limiting Network Access and Implementing Encryption
381(1)
Physical Security
382(1)
Techniques for Preventing and Deterring Incidents
383(8)
Imposing Compartmentalization
384(1)
Using Honeypots, Honeynets, and Padded Cells
384(2)
Antivirus, Monitoring, and Other Host Security Controls
386(1)
Backup and Recovery
387(1)
User Training, Security Awareness, and Ongoing Education
388(3)
Incident Response
391(3)
Preparation
392(1)
Detection and Analysis
393(1)
Containment
393(1)
Eradication
393(1)
Recovery
393(1)
Post-Incident Follow-Up
393(1)
Fail-Secure, Fail-Open, and Fail-Close Options
394(1)
Network Security Assessments and Testing
395(3)
Security Assessment
396(1)
Configuration Scans
396(1)
Vulnerability Scanning
396(1)
Penetration Testing
397(1)
Post-Mortem Assessment Review
398(1)
Change Management
398(1)
Compliance Auditing
399(1)
Network Security Troubleshooting
400(2)
Chapter Summary
402(1)
Key Concepts And Terms
403(1)
Chapter 14 Assessment
403(2)
Chapter 15 Emerging Technology And Regulatory Considerations
405(22)
What the Future Holds for Network Security, Firewalls, and VPNs
406(5)
Threats
407(1)
Firewall Capabilities
407(1)
Encryption
407(1)
Authentication
408(1)
Metrics
409(1)
Focus
409(1)
Securing the Cloud
410(1)
Securing Mobile Devices
410(1)
Internet of Things
410(1)
Mobile IP
411(1)
Bring Your Own Device (BYOD)
411(1)
Resource Sites for Network Security, Firewalls, and VPNs
411(1)
Firewall Vendors
411(1)
Virtual Private Network Vendors
411(1)
Network Security Websites
412(1)
Network Security Magazine Websites
412(1)
Tools for Network Security, Firewalls, and VPNs
412(1)
Commercial Off-the-Shelf (COTS) Software
412(1)
Open-Source Applications and Tools
413(1)
The Vanishing Network Perimeter
413(2)
The Impact of Ubiquitous Wireless and Mobile Connectivity
414(1)
Making Wireless and Mobile Connectivity More Secure
415(1)
Potential Uses of Security Technologies
415(2)
Regulations and Compliance
417(2)
Specialized Firewalls Available
419(2)
Emerging Network Security Technologies
421(2)
Data Leakage Prevention
421(1)
Biometrics
421(1)
Visualization Security
421(1)
IP Version 6
422(1)
VPNs, Firewalls, and Visualization
422(1)
Chapter Summary
423(1)
Key Concepts And Terms
424(1)
Chapter 15 Assessment
424(3)
Appendix A Answer Key 427(2)
Appendix B Standard Acronyms 429(6)
Glossary of Key Terms 435(28)
References 463(6)
Index 469
James Michael Stewart has been working with computers and technology for more than 25 years. His work focuses on security, certification, and various operating systems. Recently, Michael has been teaching job-skill and certification courses such as CISSP, CEH, and Security+. He is the primary author on the CISSP Study Guide 4th Edition and the Security+ 2008 Review Guide. In addition, Michael has written numerous books on other security and Microsoft certification and administration topics. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael holds the following certifications: CISSP, ISSAP, SSCP, MCT, CEI, CEH, TICSA, CIW SA, Security+, MCSE+Security Windows 2000, MCSA Windows Sever 2003, MCDST, MCSE NT & W2K, MCP+I, Network+, iNet+. He graduated in 1992 from the University of Texas at Austin with a bachelor's degree in Philosophy.

Denise Kinsey, Ph.D has worked in computer networking and cybersecurity for over 20 years. She has designed, implemented, and managed IT and OT projects for government and the private sector. Denise is the author of IT and security books meant to educate and empower others to learn more about technology and implement secure systems for their employers and their homes. When not solving cybersecurity problems she loves to work with her students to improve the networks and cybersecurity of nonprofits and businesses. Denise holds numerous certifications including: CISSP. C CISO, Security+, and many others. Dr. Kinsey is an Associate Professor.