Computer network security / (Record no. 80867)

000 -LEADER
fixed length control field 08137nam a22004215i 4500
001 - CONTROL NUMBER
control field 21245315
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230222103249.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr aa aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191017s2019 nju 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019952965
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781786305275
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119706748
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119706724
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119706762
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng.
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Sadiqui, Ali,
Relator term author.
245 10 - TITLE STATEMENT
Title Computer network security /
Statement of responsibility, etc Ali Sadiqui.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 1911
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey:
Name of publisher, distributor, etc ISTE Ltd / John Wiley and Sons Inc,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xiii, 272 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index
505 0# - CONTENTS
Formatted contents note TABLE OF CONTENTS<br/>Preface xi<br/><br/>Introduction xiii<br/><br/>Chapter 1. Fundamentals of Network Security 1<br/><br/>1.1. Introduction 1<br/><br/>1.1.1. The main objectives of securing a network 2<br/><br/>1.1.2. Information security terminology 2<br/><br/>1.2. Types of network security 4<br/><br/>1.2.1. Physical security 4<br/><br/>1.2.2. Logical security 4<br/><br/>1.2.3. Administrative security 5<br/><br/>1.3. The main risks related to the logical security of the network 5<br/><br/>1.3.1. Different kinds of network attacks 5<br/><br/>1.3.2. Network security measures 7<br/><br/>1.3.3. Vulnerability audit measures 8<br/><br/>1.4. Exercises to test learning 8<br/><br/>Chapter 2. Securing Network Devices 15<br/><br/>2.1. Types of network traffic 15<br/><br/>2.2. Securing the management plan 16<br/><br/>2.3. Securing passwords 16<br/><br/>2.4. Implementing connection restrictions 17<br/><br/>2.4.1. Configuring a login banner 17<br/><br/>2.4.2. Configuring connection parameters 17<br/><br/>2.5. Securing access through console lines, VTY and auxiliaries 18<br/><br/>2.5.1. Securing access through the console line and deactivating the auxiliary line 18<br/><br/>2.5.2. Securing VTY access with ssh 18<br/><br/>2.6. Allocation of administrative roles 19<br/><br/>2.6.1. Privilege levels of the IOS system 19<br/><br/>2.6.2. Configuring a privilege level 19<br/><br/>2.6.3. Setting a privilege level per user 20<br/><br/>2.6.4. Setting a privilege level for console, VTY, and auxiliary line access 20<br/><br/>2.6.5. Securing access with the management of “views” and “super-views” 21<br/><br/>2.6.6. Securing configuration files and the IOS system 22<br/><br/>2.6.7. Using automated security features 23<br/><br/>2.7. Securing the control plane 24<br/><br/>2.7.1. Introduction 24<br/><br/>2.7.2. MD5 authentication 24<br/><br/>2.7.3. Configuring OSPF protocol authentication 24<br/><br/>2.7.4. Configuring EIGRP protocol authentication 25<br/><br/>2.7.5. Configuring RIP authentication 26<br/><br/>2.8. Exercises for application 26<br/><br/>Chapter 3. Supervising a Computer Network 41<br/><br/>3.1. Introduction 41<br/><br/>3.2. Implementing an NTP server 42<br/><br/>3.2.1. Introduction to the NTP 42<br/><br/>3.2.2. How the NTP works 42<br/><br/>3.2.3. NTP configuration 43<br/><br/>3.3. Implementing a Syslog server 44<br/><br/>3.3.1. Introduction to the Syslog 44<br/><br/>3.3.2. How Syslog works 45<br/><br/>3.3.3. Configuring a Syslog client 46<br/><br/>3.4. Implementing the Simple Network Management Protocol (SNMP) 46<br/><br/>3.4.1. Introducing the SNMP 46<br/><br/>3.4.2. How SNMP works 47<br/><br/>3.4.3. SNMP configuration 49<br/><br/>3.5. Exercises for application 50<br/><br/>Chapter 4. Securing Access Using AAA 67<br/><br/>4.1. Introduction 67<br/><br/>4.2. AAA authentication 68<br/><br/>4.2.1. Local AAA authentication 68<br/><br/>4.2.2. AAA authentication based on a server 69<br/><br/>4.3. AAA authorizations 71<br/><br/>4.4. AAA traceability 71<br/><br/>4.5. Exercises for application 72<br/><br/>Chapter 5. Using Firewalls 79<br/><br/>5.1. Introducing firewalls 80<br/><br/>5.2. Types of firewalls 80<br/><br/>5.3. Setting up a firewall 80<br/><br/>5.4. Different firewall strategies 81<br/><br/>5.5. ACL-based firewalls 81<br/><br/>5.5.1. Introduction 81<br/><br/>5.5.2. The location of ACLs 81<br/><br/>5.5.3. IPv4 ACLs 81<br/><br/>5.5.4. IPv6 ACLs 82<br/><br/>5.5.5. ACL recommendation 83<br/><br/>5.6. Zone-based firewalls 84<br/><br/>5.6.1. Introduction 84<br/><br/>5.6.2. Types of security zones in a network 84<br/><br/>5.6.3. Rules applied to interzone traffic 85<br/><br/>5.6.4. Terminology 86<br/><br/>5.6.5. Configuring a ZFW 86<br/><br/>5.7. Creating zones 86<br/><br/>5.8. Creating Class-Maps 86<br/><br/>5.9. Creating the Policy-Map to apply the Class-Maps 87<br/><br/>5.10. Defining the zone pairs 87<br/><br/>5.11. Applying the policy maps to the zone pairs 87<br/><br/>5.12. Assigning interfaces to zones 87<br/><br/>5.13. Exercises for application 88<br/><br/>Chapter 6. Putting in Place an Intrusion Prevention System (IPS) 101<br/><br/>6.1. Introduction to a detector 102<br/><br/>6.2. The differences between an IDS and an IPS 102<br/><br/>6.3. Types of IPS 103<br/><br/>6.4. Cisco IP solutions 103<br/><br/>6.5. Modes of deploying IPS 103<br/><br/>6.6. Types of alarms 104<br/><br/>6.7. Detecting malicious traffic 104<br/><br/>6.7.1. Modes of detection 104<br/><br/>6.7.2. Signature-based detection 104<br/><br/>6.7.3. Other modes of detecting malicious traffic 105<br/><br/>6.8. Signature micro-engines 106<br/><br/>6.9. Severity levels of the signatures 107<br/><br/>6.10. Monitoring and managing alarms and alerts 108<br/><br/>6.11. List of actions to be taken during an attack 108<br/><br/>6.12. Configuration of an IOS IPS 109<br/><br/>6.13. Recommended practices 111<br/><br/>6.14. Exercises for application 112<br/><br/>Chapter 7. Securing a Local Network 125<br/><br/>7.1. Introduction 125<br/><br/>7.2. Types of attacks on Layer 2 126<br/><br/>7.2.1. MAC address flooding attacks 126<br/><br/>7.2.2. MAC spoofing attack 127<br/><br/>7.2.3. The DHCP starvation attack 127<br/><br/>7.2.4. VLAN hopping attacks 128<br/><br/>7.2.5. STP-based attacks 130<br/><br/>7.3. The best security practices for protecting Layer 2 131<br/><br/>7.4. Exercises for application 132<br/><br/>Chapter 8. Cryptography 143<br/><br/>8.1. Basic concepts in cryptography 143<br/><br/>8.1.1. Definition 143<br/><br/>8.1.2. Terminology 144<br/><br/>8.2. The different classifications of cryptology 144<br/><br/>8.2.1. Traditional cryptography 145<br/><br/>8.2.2. Modern cryptography 146<br/><br/>8.2.3. Symmetric and asymmetric encryption 147<br/><br/>8.3. Key management 149<br/><br/>8.3.1. Introduction 149<br/><br/>8.3.2. Diffie-Hellman key exchange 149<br/><br/>8.4. Hash functions 151<br/><br/>8.5. HMAC codes 151<br/><br/>8.6. Asymmetric cryptography 151<br/><br/>8.6.1. Introduction 151<br/><br/>8.6.2. How it works 152<br/><br/>8.6.3. Digital signatures 153<br/><br/>8.6.4. Public key infrastructure 155<br/><br/>8.7. Exercises for application 159<br/><br/>Chapter 9. IPsec VPNs 173<br/><br/>9.1. The IPsec protocol 173<br/><br/>9.1.1. Objectives of IPsec 173<br/><br/>9.1.2. Basic IPsec protocols 174<br/><br/>9.1.3. The IPsec framework 174<br/><br/>9.1.4. The IPsec security association 175<br/><br/>9.1.5. IPsec modes 175<br/><br/>9.2. IKE protocol 176<br/><br/>9.2.1. Introduction 176<br/><br/>9.2.2. Components of IKE 176<br/><br/>9.2.3. IKE phases 176<br/><br/>9.3. The site-to-site VPN configuration 178<br/><br/>9.3.1. Introduction 178<br/><br/>9.3.2. Configuration of IPsec VPN 179<br/><br/>9.4. Exercises for application 181<br/><br/>Chapter 10. Studying Advanced Firewalls 189<br/><br/>10.1. Cisco ASA firewalls 189<br/><br/>10.1.1. Introduction 189<br/><br/>10.1.2. ASA models 190<br/><br/>10.1.3. Modes for using ASA devices 190<br/><br/>10.1.4. An overview of ASA 5505 191<br/><br/>10.1.5. ASA levels of security 192<br/><br/>10.1.6. Configuring an ASA with CLI 193<br/><br/>10.2. Exercises for application 198<br/><br/>10.3. Configuring Cisco elements with graphical tools 210<br/><br/>10.3.1. An overview of the CCP 210<br/><br/>10.3.2. An overview of the ASDM 210<br/><br/>10.3.3. Using CCP and ASDM 210<br/><br/>10.4. The TMG 2010 firewall 211<br/><br/>10.4.1. Introduction 211<br/><br/>10.4.2. Installation and configuration 211<br/><br/>References 243<br/><br/>Index 245
520 ## - SUMMARY, ETC.
Summary, etc This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the “Cisco Academy” program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Full text available at Wiley Online Library Click here to view
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119706762
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY ALBASA 52253 005.8 Sa154 2020 CL-52253 2021-12-04 2021-12-04 EBOOK