skip to content
Designing network security Preview this item
ClosePreview this item
Checking...

Designing network security

Author: Merike Kaeo
Publisher: Indianapolis, IN : Cisco Press : Macmillan Technical Pub., ©1999.
Series: Cisco Press fundamentals series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Designing Network Security is a practical guide designed to help you  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Kaeo, Merike.
Designing network security.
Indianapolis, IN : Cisco Press : Macmillan Technical Pub., ©1999
(DLC) 98084218
(OCoLC)41437872
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Merike Kaeo
ISBN: 1578700434 9781578700431
OCLC Number: 54116651
Notes: "A practical guide to creating a secure network infrastructure"--Cover.
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2011. MiAaHDL
Description: 1 online resource (xv, 426 pages) : illustrations.
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: Security Fundamentals --
Basic Cryptography --
Cryptography --
Authentication and Authorization --
Name Space --
Key Management --
Key Escrow --
Security Technologies --
Identity Technologies --
Security in TCP/IP Layers --
Virtual Private Dialup Security Technologies --
Public Key Infrastructure and Distribution Models --
Export Controls on Cryptography --
Historical Perspective on U.S. Policy --
Historical Perspective on International Policy --
Digital Signatures --
The Corporate Security Policy --
Threats in an Enterprise Network --
Types of Threats --
Motivation of Threat --
Common Vulnerabilities --
Considerations for a Site Security Policy --
Where to Begin --
Risk Management --
A Security Policy Framework --
Design and Implementation of the Corporate Security Policy --
Physical Security Controls --
Logical Security Controls --
Infrastructure and Data Integrity --
Data Confidentiality --
Policies and Procedures for Staff --
Security Awareness Training --
Incident Handling --
Building an Incident Response Team --
Detecting an Incident --
Handling an Incident --
Responding to the Incident --
Recovering from an Incident --
Practical Implementation --
Securing the Corporate Network Infrastructure --
Identity --
Integrity --
Data Confidentiality --
Network Availability --
Audit --
Implementation Example --
Securing Internet Access --
Internet Access Architecture --
External Screening Router Architecture --
Advanced Firewall Architecture --
Implementation Examples --
Securing Dial-In Access --
Dial-In Security Concerns.
Series Title: Cisco Press fundamentals series.
Responsibility: Merike Kaeo.

Abstract:

A practical guide to creating a secure network infrastructure  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/54116651> # Designing network security
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
   library:oclcnum "54116651" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/797048#Place/indianapolis_in> ; # Indianapolis, IN
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/797048#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://id.loc.gov/authorities/subjects/sh2008104644> ; # Internet--Security measures
   schema:about <http://id.worldcat.org/fast/1751426> ; # Internet--Security measures
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/797048#Topic/protection_de_l_information_informatique> ; # Protection de l'information (Informatique)
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/797048#Topic/reseaux_d_ordinateurs_mesures_de_surete> ; # Réseaux d'ordinateurs--Mesures de sûreté
   schema:about <http://experiment.worldcat.org/entity/work/data/797048#Topic/internet_securite_mesures> ; # Internet--Sécurité--Mesures
   schema:about <http://dewey.info/class/005.8/e21/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/797048#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "1999" ;
   schema:creator <http://viaf.org/viaf/41379628> ; # Merike Kaeo
   schema:datePublished "1999" ;
   schema:description "A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Designing Network Security is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and some emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the dial-in environment. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/797048> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/797048#Series/cisco_press_fundamentals_series> ; # Cisco Press fundamentals series.
   schema:isSimilarTo <http://www.worldcat.org/oclc/41437872> ;
   schema:name "Designing network security"@en ;
   schema:productID "54116651" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/54116651#PublicationEvent/indianapolis_in_cisco_press_macmillan_technical_pub_1999> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/797048#Agent/cisco_press> ; # Cisco Press
   schema:publisher <http://experiment.worldcat.org/entity/work/data/797048#Agent/macmillan_technical_pub> ; # Macmillan Technical Pub.
   schema:url <http://proquest.safaribooksonline.com/1578700434> ;
   schema:url <http://catalog.hathitrust.org/api/volumes/oclc/41437872.html> ;
   schema:workExample <http://worldcat.org/isbn/9781578700431> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/54116651> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/797048#Agent/macmillan_technical_pub> # Macmillan Technical Pub.
    a bgn:Agent ;
   schema:name "Macmillan Technical Pub." ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Place/indianapolis_in> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Series/cisco_press_fundamentals_series> # Cisco Press fundamentals series.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/54116651> ; # Designing network security
   schema:name "Cisco Press fundamentals series." ;
   schema:name "Cisco Press fundamentals series" ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Topic/internet_securite_mesures> # Internet--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Internet--Sécurité--Mesures"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Topic/protection_de_l_information_informatique> # Protection de l'information (Informatique)
    a schema:Intangible ;
   schema:name "Protection de l'information (Informatique)"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Topic/reseaux_d_ordinateurs_mesures_de_surete> # Réseaux d'ordinateurs--Mesures de sûreté
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Mesures de sûreté"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/797048#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh2008104644> # Internet--Security measures
    a schema:Intangible ;
   schema:name "Internet--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1751426> # Internet--Security measures
    a schema:Intangible ;
   schema:name "Internet--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/41379628> # Merike Kaeo
    a schema:Person ;
   schema:familyName "Kaeo" ;
   schema:givenName "Merike" ;
   schema:name "Merike Kaeo" ;
    .

<http://worldcat.org/isbn/9781578700431>
    a schema:ProductModel ;
   schema:isbn "1578700434" ;
   schema:isbn "9781578700431" ;
    .

<http://www.worldcat.org/oclc/41437872>
    a schema:CreativeWork ;
   rdfs:label "Designing network security." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/54116651> ; # Designing network security
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.