Dr. Tom Shinder's ISA server 2006 migration guide
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successfu...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress Publishing
c2007.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627116706719 |
Tabla de Contenidos:
- Front Cover; Dr. Tom Shinder's ISA Server 2006 Migration Guide; Copyright Page; Lead Authors; Contributing Authors; Contents; Introduction; Chapter 1: Network Security Basics; Introduction; Security Overview; Defining Basic Security Concepts; Knowledge is Power; Think Like a Thief; The Intrusion Triangle; Removing Intrusion Opportunities; Security Terminology; Addressing Security Objectives; Controlling Physical Access; Physical Access Factors; Protecting the Servers; Keeping Workstations Secure; Protecting Network Devices; Securing the Cable; Safely Going Wireless; Have Laptop, Will Travel
- The Paper ChaseRemovable Storage Risks; Physical Security Summary; Preventing Accidental Compromise of Data; Know Your Users; Educate Your Users; Control Your Users; Preventing Intentional Internal Security Breaches; Hiring and Human Resource Policies; Detecting Internal Breaches; Preventing Intentional Internal Breaches; Preventing Unauthorized External Intrusions; External Intruders with Internal Access; Tactical Planning; Recognizing Network Security Threats; Understanding Intruder Motivations; Recreational Hackers; Profit-motivated Hackers; Vengeful Hackers; Hybrid Hackers
- Classifying Specific Types of AttacksSocial engineering attacks; What is social engineering?; Protecting your network against social engineers; Denial of Service (DOS) Attacks; Distributed Denial of Service attacks; DNS DOS attack; SYN attack/LAND attack; Ping of Death; Teardrop; Ping Flood (ICMP flood); SMURF attack; UDP bomb or UDP flood; UDP Snork attack; WinNuke (Windows out-of-band attack); Mail bomb attack; Scanning and Spoofing; Port scan; IP half scan attack; IP Spoofing; Source Routing attack; Other protocol exploits; System and software exploits; Trojans, viruses and worms; Trojans
- VirusesWorms; Designing a Comprehensive Security Plan; Evaluating Security Needs; Assessing the type of business; Assessing the type of data; Assessing the network connections; Assessing management philosophy; Understanding management models; Understanding Security Ratings; Legal Considerations; Designating Responsibility for Network Security; Responsibility for Developing the Security Plan and Policies; Responsibility for Implementing and Enforcing the Security Plan and Policies; Designing the Corporate Security Policy; Developing an Effective Password Policy; Password Length and Complexity
- Who creates the password?Password Change Policy; Summary of Best Password Practices; Educating Network Users on Security Issues; Summary; Chapter 2: ISA Server 2006 Client Types and Automating Client Provisioning; Introduction; Understanding ISA Server 2006 Client Types; Understanding the ISA Server 2006 SecureNAT Client; SecureNAT Client Limitations; SecureNAT Client Advantages; Name Resolution for SecureNAT Clients; Name Resolution and ""Looping Back"" Through the ISA Server 2006 Firewall; Understanding the ISA Server 2006 Firewall Client
- Allows Strong User/Group-Based Authentication for All Winsock Applications Using TCP and UDP Protocols