Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

named access lists

cocmmands

nameif command (PIX Firewall)

NAT (network address translation) 2nd

disadvantages of

enabling PIX for 2nd

router NAT traslation table, viewing

nat command (PIX Firewall)

National Institute of Standards and Technology (NIST), U.S

National Security Agency
[See NSA]

necessary tools and procedures, determining

NetScreen firewalls 2nd 3rd

data flow

deep packet layer inspection

functions not convered in detail

session table

NetStumbler (WLAN packet analyzer)

Network accounting function

network address translation
[See NAT]

network addresses

network architecture

network audits

network design

fundamental principles 2nd

defense in depth

design activities, tools, and techniques 2nd

requirements and constraints

top-down design practices

methodology 2nd

stages of the network 2nd

physical security 2nd

internal security

personnel training

securing the perimeter

survivability and recovery

return on investment

switches and hubs

network IDS 2nd 3rd 4th

case study 2nd

active response, blocking host 2nd

IDS Event Viewer

sensor initialization and configuration 2nd

sensor placement

tuning IDS

deploying in the network 2nd

PIX Firewall as sensor

router IDS features and network modules

evasion and antievasion techniques

host IDS versus

management communications

in-band management

out-of-band management

notification and reporting

organizational issues and complications

political constraints

social constraints

technological constraints

responses to attacks

IP session logging

TCP resets

sensor components and architecture

network infrastructure, requirements of

network interface cards (NICs), wireless

network layer

correspondence of IP protocol to

mobile IP connections

network layer (Layer 3, OSI model)

Network Management Server (NMS)

Network Management System (NMS)

network performance

monitoring with SAA

network resources

summary of use and protection of, in security policy

network security

references on

books

websites 2nd

responsibilities for

network security database (NSDB)

updates for IDS signatures

network traffic

analysis of

simulating

network traffic, inbound and outbound

networking

references on

books

websites 2nd

networks

availability to Internet and public networks

NIST (National Institute of Standards and Technology)

NMS (Network Management System)

nonces 2nd

nonstatistical anomaly detection

notification alarms, IDS

notification features, network IDS

notifications, SNMP

configuring

NSA (National Security Agency) 2nd

security guides

NSDB (network security database)

updates for IDS signatures

NTFS file encryption

number used once
[See nonces]

numbered access list commands

numbered access lists

extended 2nd

/ 196