Hardening Network Infrastructure by Wesley NoonanHardening Network Infrastructure by Wesley Noonan

Hardening Network Infrastructure

byWesley Noonan

Paperback | May 6, 2004

Pricing and Purchase Info

$52.16 online 
$57.95 list price save 9%
Earn 261 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Bulletproof your system "before you are hacked! From the publisher of the international best-seller, "Hacking Exposed. No More Twinkies (R)! Most networks are hard on the outside and soft and gooey on the inside. Once the outer shell is penetrated, the insides are relatively unprotected. Hardening Network Infrastructure delivers proactive--instead of reactive--guidance on how to secure the perimiter as well as the internal network core.- No "it depends" information. IT Pros don't want to wade through reams of paper to figure out what is right for their system/configuration. Hardening Network Infrastructure provides declarative information on how to harden your Perimeter and Internal Network, Routers and Switches, Intrusion Detection/Prevention Systems, and WLAN connections how and where to use Content Filters and Application Proxies- Finally, a unique approach that takes the guess work out of Windows(R) security. "Do This Now!"-Checklist of 5-8 tasks to complete first, "Take It From The Top" provides systematic Windows(R) hardening steps, followed by "Once Is Never Enough!" because security is iterative--it must be an ongoing process, finally, for the first time, readers find out how to diplomatically and politically navigate the "Soft Issues" of securing financial support, management buy-in and employee acceptance of their security strategy
Title:Hardening Network InfrastructureFormat:PaperbackDimensions:480 pages, 9.22 × 7.48 × 1.22 inPublished:May 6, 2004Publisher:McGraw-Hill/OsborneLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0072255021

ISBN - 13:9780072255027


Table of Contents

Part I: Do This Now!

Ch. 1. Do these 6 things before you do anything else!

Ch. 2. Hardening Your Perimeter Network

Ch. 3. Firewalls, IDS, IDP

Ch. 4. Hardening Your External Access Connections Including VPN, Dial-in and Remote Access

Ch. 5. Hardening Your Perimeter Routers and Switches

Ch. 6. Positioning and Deploying Content Filters/Application Proxies

Ch. 7. Utilizing Your Perimeter Devices to Implement a Secure Perimeter

Part II: Hardening Your Internal Network

Ch. 8. Using Firewalls, IDS and IDP to Harden Your Internal Network

Ch. 9. Hardening Internal Routers, Switches

Ch. 10. Hardening Wireless LAN Connections

Ch. 11. Hardening Intersite Locations and WAN Connections

Ch. 12. Implement Access Authorization

Ch. 13. Implement an Enterprise Monitoring Solution

Ch. 14. How to Implement a Secure Internal Network

Part III: Once is Never Enough!

Ch. 15. Review Your Security Policy, Posture and Auditing

Ch. 16. Patches and Upgrades

Ch. 17. Managing Changes to Your Policy

Part IV: How to Succeed at Hardening Your Network Infrastructure

Ch. 18. Where Does the Money Come From and Setting Perceptions

Ch. 19. Staffing and Training Issues

Ch. 20. Handling Security Failures

Appendix A: Additional Infrastructure Security Resources