Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems
Stephen Northcutt, Mark T. Edmead
New Riders, 2003 - Computers - 678 pages
The most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network defenses. It discusses perimeter components such as firewalls, VPNs, routers, and intrusion detection systems, and explains how to integrate them into a unified whole to meet real-world business requirements. The book consolidates the experience of seventeen information security professionals working together as a team of writers and reviewers. This is an excellent reference for those interested in examining best practices of perimeter defense and in expanding their knowledge of network security. Because the book was developed in close coordination with the SANS Institute, it is also a valuable supplementary resource for those pursuing the GIAC Certified Firewall Analyst (GCFW) certification.
36 pages matching messages in this book
Results 1-3 of 36
What people are saying - Write a review
We haven't found any reviews in the usual places.
access list administrators alert allow anti-virus application architecture attacker authentication bandwidth block border router broadcast domain chapter Cisco PIX Cisco router client command communication components configuration connection database default defense in depth deploy destination devices DNS server egress filter encryption environment example external header host ICMP IDS sensors implement inbound installed interface internal network Internet intrusion detection IP address IPFilter IPSec L2TP layer log files malicious messages Microsoft monitoring network security operating systems option outbound packet filtering password performance perimeter defense permit tcp personal firewall port numbers problem protect protocol proxy firewall reflect packets remote require router routing rule scan screened subnet security policy session signature SMTP SNMP specific TCP port Tcpdump Telnet tion traffic troubleshooting tunnel types UNIX users VLANs vulnerability web server Windows workstations