Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

camera systems, internal physical security

campus access policy

card bus (wireless NIC)

CAs (Certificate Authorities)

CAs (certificate authorities) 2nd

creating your own CA 2nd

CAs (Certificate Authorities)

enrolling in

CAs (certificate authorities)

enrollment procedure for PKI users

hierarchical CAs

single root CA

CAs (Certificate Authorities)

validating signature of

CBAC

inspection rules, creating (example)

CDP (Cisco Discovery Protocol )

certificate authorities
[See CAs]

certificate revocation lists
[See CRLs]

certificates [See also digital IDs]

placement on a CRL

types of

certificates, digital 2nd 3rd

chalk marks (war-chalking)

Challenge Handshake Authentication Protocol (CHAP)

change control (business processes)

Chargen attack

Check Point, software firewalls

checksums

CIA (confidentiality, integrity, and availability)

ciphers

block and stream ciphers

Rijndael cipher

Cisco

Advanced Services for Network Security (ASNS)

Internet Operating System. SeeIOS

Intrusion Detection Host sensor

Intrusion Detection System (IDS)

IOS

IOS-based IDSs, deployment on a router or PIX-based IDS

Light Extensible Authentication Protocol (LEAP)

Linksys product line

PIX firewall

Router Security Configuration Guide

SAFE Blueprint 2nd

Secure Agent Manager 2nd

Secure Integrated Software

Wireless Security Suite 2nd

Cisco Discovery Protocol (CDP)

Cisco IOS Firewall CBAC engine
[See CBAC]

Cisco Press website

certificates

Cisco Secure Encyclopedia (CSEC) 2nd

CiscoSecure Access Control Server
[See ACS]

CiscoSecure Private Internet Exchange Firewall
[See PIX Firewall]

CiscoSecure products

CiscoView application

CiscoWorks VMS Suite

client-based firewalls

clients

VPN client, setting up

ClipBook Viewer

closed network

coded messages
[See ciphers]

cold site (disaster recovery plan)

command and control network

command and control port, network IDS

command line interface (CLI), PIX Firewall and

commands

IOS privileged executive commands

monitoring and troubleshooting SNMP

SAA operations, specifying

comments, adding in named access lists

Common Criteria EAL 4 ratings (NetScreen and PIX)

community networks, wireless

community strings, SNMP 2nd

assigning a view to

compormised keys

compression algorithm (LZS)

computer resources

summary of use and protection, in security policies

computers, cryptography and

conduits
[See access lists, PIX Firewall]

confidentiality, integrity, and availability (CIA)

Connect accounting function

Connection Establishment timer

connection hijacking (TCP)

connection-based security policy 2nd

connection-killing attacks

connectivity and associated policies

consensus, communicating

console access to devices, avoiding

consoles

accessing routers from

constraints, network design

content filtering 2nd

Context Based Access Control
[See CBAC]

cookies

managing by forcing all to be session cookies

costs and benefits of security

countermeasures against vulnerabilities, information about

covert channels

CPU

tie-ups in attacks

CPU processing speed

crackers 2nd

hackers versus

script kiddies

cracking codes (cryptoanalysis)

credentials, Kerberos

CRLs (certificate revocation lists)

cross certifying

cryptography 2nd 3rd 4th [See also encryption]

asymmetric key algorithms 2nd

Diffie-Hellman

PGP

RSA

cryptoanalysis versus

digital certificates

encryption 2nd

hashing algorithms

MD5

SHA-1

history of 2nd

computers, advent of

crypto machines

manual systems

NSA research and education on

PKCS (Public Key Cryptography Standard)

secret key, Kerberos

SSL and TLS

symmetric key algorithms

AES

DES

Triple DES (3DES)

wireless equivalent privacy keys
[See WEP protocol]

CSEC (Cisco Secure Encyclopedia)


/ 196