Process of Network Security, The: Designing and Managing a Safe Network

Author:   Thomas Wadlow
Publisher:   Pearson Education Limited
ISBN:  

9780201433173


Pages:   304
Publication Date:   16 March 2000
Format:   Paperback
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Our Price $76.31 Quantity:  
Add to Cart

Share |

Process of Network Security, The: Designing and Managing a Safe Network


Add your own review!

Overview

Presenting the process behind securing an enterprise network, this text includes information on the modelling behind the implementation. It offers a wide-ranging perspective on the many issues surrounding security within the workplace.

Full Product Details

Author:   Thomas Wadlow
Publisher:   Pearson Education Limited
Imprint:   Addison Wesley
Dimensions:   Width: 23.50cm , Height: 2.00cm , Length: 18.60cm
Weight:   0.435kg
ISBN:  

9780201433173


ISBN 10:   0201433176
Pages:   304
Publication Date:   16 March 2000
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Active
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Table of Contents

Preface. Acknowledgments. 1. Understanding Security. What Are We Protecting? Thinking Like a Defender. The Reader of This Book. The Organization We Are Protecting. The Process of Security. How Do You Know That the Process Is Working? Trend Analysis. 2. Writing a Security Policy. Pitfalls. Staging a Coup Contents of the Policy 3. Who Is Attacking You? The Nature of the Beast. Security as an Evolutionary Strategy. 4. Security Design Process. Thinking About Security. Principles of Security. The Shape of Your Defenses. The Shape of Your Security Organization. 5. Building a Security Team. Employee Characteristics. Job Functions in a Security Team. Training and Cross-Training. Interviewing Security Candidates. Background Checks. Hiring. Firing. 6. Fortifying Network Components. What Is a Network Component? Component Types. Selecting Components. Component Categories. Fortifying Components. System Fortification. 7. Personnel Security. Management Issues. Hiring Process. Trouble with Employees. Firing Process. Resignation Process. Contractors. 8. Physical Security. What Are the Threats? Physical Security Basics. Going Overboard. Backups. Denial of Service. Electrical Power. Telephones. Access Control Logging and Log Analysis. 9. Monitoring Your Network. The Shape of the Logging System. What to Log. Logging Mechanisms. Time. Sensors. Logging System Design. Log Management. Log Analysis. 10. Auditing Your Network. Why Should You Audit Your Network? Types of Audit. What Should the Audit Measure? Who Should Do the Audit? Expectations. 11. Quantifying the Value of Security. Perception of Value. Process of Explaining Security Issues. Measurements. 12. Preparing for an Attack. Getting Started. War Games. Post-Mortem Analysis. Developing a Response Plan. Personnel. Safety Equipment. Survival Pack Contents. Choosing Hiding Places. Set Your Own Ground Rules. 13. Handling an Attack. Exciting, but Not Fun. Thinking Pathologically. About Attacks. What You Can Do. What You Should Not Do. Response Team. Priorities During an Attack. 14. Forensics. Getting Started. The Art of Investigation. The Clean Room. Analyzing the Contaminated File System. Analysis Tools. What to Look For. 15. Log Analysis. Integrity Checks. Log Analysis. The Hunt. Developing Theories. Legalities. 16. Damage Control. Priorities. Advance Preparation. Post-Mortem Analysis. Appendix A: Glossary. 0201433176T04062001

Reviews

Author Information

Thomas A. Wadlow is co-founder, Chief Technology Officer, and Vice-President of Engineering and Security for Pilot Network Services, Inc., a company specializing in Internet security. He has also worked as a networking and systems professional for Lawrence Livermore Laboratory, Schlumberger's Palo Alto Research Center, Xerox's Palo Alto Research Center, ParcPlace Systems, and Sun Microsystems Laboratories. 0201433176AB04062001

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List