Building DMZs for Enterprise Networks-SEEDMORE-ORGseeders: 0
leechers: 0
Building DMZs for Enterprise Networks-SEEDMORE-ORG (Size: 11.67 MB)
Description
General Information
Type.................: Ebook Part Size............: 12,237,571 bytes Web Site http://www.seedmore.org/ Release Notes This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium, and enterprise networks. The primary role of a DMZ is to mitigate risks associated with offering services to untrusted clients. A DMZ accomplishes this by providing network-level protection for a hosting environment, as well as segregating public hosting facilities from the private network infrastructure. This small but very important segment of the network is exposed to the public Internet and is the most difficult area on the network to create and maintain, both from an engineering and a security standpoint. In this book readers will learn how to make DMZs using best-of-breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no books written specifically on DMZs - This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances. - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book Table of Contents Chapter 1: DMZ Concepts, Layout, and Conceptual Design Chapter 2: Windows 2000 DMZ Design Chapter 3: Sun Solaris DMZ Design Chapter 4: Wireless DMZs Chapter 5: Firewall Design: Cisco PIX Chapter 6: Firewall and DMZ Design: Check Point NG Chapter 7: Firewall and DMZ Design: Nokia Firewall Chapter 8: Firewall and DMZ Design: ISA Server 2000 Chapter 9: DMZ Router and Switch Security Chapter 10: DMZ-Based VPN Services Chapter 11: Implementing Wireless DMZs Chapter 12: Sun Solaris Bastion Hosts Chapter 13: Windows 2000 Bastion Hosts Chapter 14: Hacking the DMZ Chapter 15: Intrusion Detection in the DMZ Product Details * ISBN: 1931836884 * ISBN-13: 9781931836883 * Format: Paperback, 744pp * Publisher: Syngress Publishing Sharing Widget |