Practical Internet Security~tqw~ darksidergseeders: 0
leechers: 1
Practical Internet Security~tqw~ darksiderg (Size: 2.65 MB)
Description
*******************************************************************************
Practical Internet Security ******************************************************************************* General InformationType.................: Ebook Part Size............: 2,777,038 bytes Post InformationPosted by............: ~tqw~ Release NotesAs organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems. Table Of Contents Dedication v Acknowledgements xi Foreword xiii Preface xv PART I: INTRODUCTION TO INTERNET SECURITY 1 Chapter 1: Internet Technologies 3 Chapter 2: Basic Security Issues 27 PART II: ESTABLISHING YOUR ORGANIZATION’S SECURITY 37 Chapter 3: Real Threats That Impact Security 39 Chapter 4: A Security Policy: The Foundation of Your Protection 47 PART III: DEVELOPING YOUR SECURITY POLICY 57 Chapter 5: Steps To Take Now 59 Chapter 6: Responding To Attacks 77 PART IV: SECURING THE WEB CLIENT 143 Chapter 7: Threats And Vulnerabilities 145 Chapter 8: Protecting Your Web Browser 177 PART V: NETWORK INTERCONNECTIONS: A MAJORPOINT OF VULNERABILITY 183 Chapter 9: Basic Operating System And TCP/IP Concepts 185 Chapter 10: Early System Security Improvements 193 PART VI: DETERRING MASQUERADERS AND ENSURING AUTHENTICITY 203 Chapter 11: Impersonating Users 205 Chapter 12: How Masqueraders Infiltrate a System 211 Chapter 13: Holding Your Defensive Line 225 PART VII: PREVENTING EAVESDROPPING TO PROTECT YOUR PRIVACY 233 Chapter 14: Unauthorized Listening And Looking 235 Chapter 15: Countering Or Not Countering The Eavesdropper: That’s The Question? 243 PART VIII: THWARTING COUNTERFEITERS AND FORGERY TO RETAIN INTEGRITY 255 Chapter 16: The Forger’s Arsenal 257 Chapter 17: Shielding your Assets 269 PART IX: AVOIDING DISRUPTION OF SERVICE TO MAINTAIN AVAILABILITY 275 Chapter 18: Denial-Of-Service Attacks 277 Chapter 19: Constructing Your Bastions 281 Chapter 20: The Importance Of Firewalls 285 PART X: CONFIGURING OPERATING SYSTEM AND NETWORK SECURITY 293 Chapter 21: Operating Systems That Pose Security Risks 295 Chapter 22: Network Security 309 PART XI: ENHANCING WEB SERVER SECURITY 317 Chapter 23: Controlling Access 319 Chapter 24: Extended Web Site Security Functionality 325 Chapter 25: Securing Web Communications With SSL VPNS 331 PART XII: ISSUING AND MANAGING CERTIFICATES 337 Chapter 26: Why Digital Certificates Are Used 339 Chapter 27: Certificate Authorities 349 Chapter 28: Trusting SSL CAs In Servers And Browsers 355 PART XIII: FIREWALLS AND FIREWALL TOPOLOGIES 363 Chapter 29: Protecting Servers And Clients with Firewalls 365 Chapter 30: Choosing The Right Firewall 373 Chapter 31: Firewall Topologies 399 Chapter 32: Selecting Firewall Security Topology Policy 411 PART XIV: SECURITY MANAGEMENT SOLUTIONS AND FUTURE DIRECTIONS 431 Chapter 33: Identifying And Responding To Security Violations 433 Chapter 34: Real-Time Monitoring And Auditing 439 Chapter 35: Limiting Damage 445 Chapter 36: Keeping Up To Date On New Threats 449 Chapter 37: Emerging Technologies 453 Chapter 38: Summary, Conclusions And Recommendations 457 PART XV: APPENDICES 469 Appendix A: Configuring Internet Authentication Service On MicrosoftWindows 2003 ServerWindows 2003 / Enhanced 471 Appendix B: Internet Security Management, Resiliency And Security 475 Appendix C: List Of Top Internet Security Implementation And Deployment Companies 483 Appendix List Of Internet Security Products 505 Appendix E: List Of Internet Security Standards 511 Appendix F: List Of Miscellaneous Internet Security Resources 515 Appendix G: Glossary 517 Index 525 Product Details * ISBN: 038740533X * ISBN-13: 9780387405339 * Format: Hardcover, 536pp * Publisher: Springer-Verlag New York, LLC * Pub. Date: October 2006 * Edition Number: 1 Install NotesPDF Reader Sharing Widget |