Building DMZs for Enterprise Networks-SEEDMORE-ORG

seeders: 0
leechers: 0
Added on February 2, 2008 by in Books
Torrent verified.



Building DMZs for Enterprise Networks-SEEDMORE-ORG (Size: 11.67 MB)
 Building DMZs for Enterprise Networks.nfo3.85 KB
 Building DMZs for Enterprise Networks.pdf11.67 MB


Description

General Information

Type.................: Ebook

Part Size............: 12,237,571 bytes









Web Site

http://www.seedmore.org/



Release Notes

This book covers what an administrator needs to plan out and integrate a DMZ

into a network for small, medium, and enterprise networks. The primary role of a

DMZ is to mitigate risks associated with offering services to untrusted clients.

A DMZ accomplishes this by providing network-level protection for a hosting

environment, as well as segregating public hosting facilities from the private

network infrastructure. This small but very important segment of the network is

exposed to the public Internet and is the most difficult area on the network to

create and maintain, both from an engineering and a security standpoint. In this

book readers will learn how to make DMZs using best-of-breed software and

hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point.



This book covers what an administrator needs to plan out and integrate a DMZ

into a network for small, medium and Enterprise networks. In most enterprises

the perception is that a firewall provides a hardened perimeter. However, the

security of internal networks and hosts is usually very soft. In such an

environment, a non-DMZ system that is offering services to the Internet creates

the opportunity to leapfrog to other hosts in the soft interior of your network.

In this scenario your internal network is fair game for any attacker who manages

to penetrate your so-called hard perimeter.



- There are currently no books written specifically on DMZs

- This book will be unique in that it will be the only book that teaches readers

how to build a DMZ using all of these products: ISA Server, Check Point NG,

Cisco Routers, Sun Servers, and Nokia Security Appliances.

- Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's

ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy

this book



Table of Contents

Chapter 1: DMZ Concepts, Layout, and Conceptual Design

Chapter 2: Windows 2000 DMZ Design

Chapter 3: Sun Solaris DMZ Design

Chapter 4: Wireless DMZs

Chapter 5: Firewall Design: Cisco PIX

Chapter 6: Firewall and DMZ Design: Check Point NG

Chapter 7: Firewall and DMZ Design: Nokia Firewall

Chapter 8: Firewall and DMZ Design: ISA Server 2000

Chapter 9: DMZ Router and Switch Security

Chapter 10: DMZ-Based VPN Services

Chapter 11: Implementing Wireless DMZs

Chapter 12: Sun Solaris Bastion Hosts

Chapter 13: Windows 2000 Bastion Hosts

Chapter 14: Hacking the DMZ

Chapter 15: Intrusion Detection in the DMZ



Product Details



* ISBN: 1931836884

* ISBN-13: 9781931836883

* Format: Paperback, 744pp

* Publisher: Syngress Publishing

Sharing Widget


Download torrent
11.67 MB
seeders:0
leechers:0
Building DMZs for Enterprise Networks-SEEDMORE-ORG