How to cheat at securing your network

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information ava...

Full description

Bibliographic Details
Main Author: Dubrawsky, Ido
Format: eBook
Language:English
Published: Burlington, MA Syngress 2007
Series:"How to cheat--"
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Front Cover; How to Cheat at Securing Your Network; Copyright Page; Contents; Chapter 1. General Security Concepts: Access Control, Authentication, and Auditing; Introduction to AAA; Access Control; Authentication; Auditing; Disabling Non-essential Services, Protocols, Systems and Processes; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. General Security Concepts: Attacks; Attacks; Active Attacks; Social Engineering; Vulnerability Scanning; Passive Attacks; Password Attacks; Malicious Code Attacks; Summary; Solutions Fast Track; Frequently Asked Questions
  • Chapter 3. Communication Security: Remote Access and MessagingIntroduction; The Need for Communication Security; Remote Access Security; E-mail Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Communication Security: Wireless; Introduction; Wireless Concepts; Wireless Vulnerabilities; Site Surveys; Implementing Wireless Security: Common Best Practices; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Communication Security: Web Based Services; Introduction; Web Security; FTP Security; Directory Services and LDAP Security; Summary
  • Chapter 9. Basics of CryptographyIntroduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Public Key Infrastructure; Introduction; PKI; Key Management and Certificate Lifecycle; Summary; Solutions Fast Track; Frequently Asked Questions; Index
  • Solutions Fast TrackFrequently Asked Questions; Chapter 6. Infrastructure Security: Devices and Media; Introduction; Device-based Security; Media-based Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Topologies and IDS; Introduction; Security Topologies; Intrusion Detection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Infrastructure Security: System Hardening; Introduction; Concepts and Processes of OS and NOS Hardening; Network Hardening; Application Hardening; Summary; Solutions Fast Track; Frequently Asked Questions