Usually ships in art fundamentals book pdf hours. Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions.
This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks.
Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Each chapter in this section is a self-contained tutorial, allowing you to skip to those topics of greatest interest or primary concern. Part IV includes several reference appendixes, including the Cisco SAFE Blueprint, NSA guidelines, and SANS policies. Whether you are looking for an introduction to network security principles and practices or a security configuration reference, this book provides you with the invaluable insight you need to protect valuable company resources. Secure Socket Layer and Transport Layer Security. Importance of a Security Policy.
Design Activities, Tools, and Techniques. Router Security to Protect the Network. Case Study: Placing Filtering Routers and Firewalls. Host Sensor Components and Architecture. Deploying Host-Based Intrusion Detection in the Network. Network Sensor Components and Architecture. Deploying Network-Based Intrusion Detection in the Network.
Organization and Their Typical Placement. IDS Placement on the Network Blueprint. IDS Sensor Initialization and Configuration. Case Study: Configuring Secure Remote Access.