text.skipToContent text.skipToNavigation
  1. Home
  2. Computer Science & IT
  3. Inside Network Perimeter Security

Inside Network Perimeter Security, 2nd edition

  • Stephen Northcutt
  • Lenny Zeltser
  • Scott Winters
  • Karen Kent
  • Ronald W. Ritchey

Published by Sams Publishing (March 4th 2005) - Copyright © 2005

2nd edition

Inside Network Perimeter Security

ISBN-13: 9780672327377

Includes: Paperback
Free delivery
$49.99

What's included

  • Paperback

    You'll get a bound printed text.

Overview

Table of contents

Introduction.

    Who Should Read This Book.

    Why We Created This Book’s Second Edition.

    Overview of the Book’s Contents.

    Conventions.

I. THE ESSENTIALS OF NETWORK PERIMETER SECURITY.

1. Perimeter Security Fundamentals.

    Terms of the Trade.

      The Perimeter.

      Border Routers.

      Firewalls.

      Intrusion Detection Systems.

      Intrusion Prevention Systems.

      Virtual Private Networks.

      Software Architecture.

      De-Militarized Zones and Screened Subnets.

    Defense in Depth.

      Components of Defense in Depth.

    Case Study: Defense in Depth in Action.

    Summary.

2. Packet Filtering.

    TCP/IP Primer: How Packet Filtering Works.

    TCP and UDP Ports.

    TCP’s Three-way Handshake.

    The Cisco Router as a Packet Filter.

    An Alternative Packet Filter: IPChains.

    The Cisco ACL.

      Rule Order.

      Cisco IOS Basics.

    Effective Uses of Packet-Filtering Devices.

      Filtering Based on Source Address: The Cisco Standard ACL.

    Egress Filtering.

    Tracking Rejected Traffic.

      Filtering by Port and Destination Address: The C

For teachers

All the material you need to teach your courses.

Discover teaching material