There's no doubt about it -- SearchNetworking.com readers love our weekly featured chapter downloads. This month you'll find an assortment of chapters on network security.
Check out this week's featured book:
You can download this week's chapter now. Be sure to bookmark this Chapter of the Week page and check back each week to access our upcoming chapters.
Anti Spam Toolkit, Chapter 16
Fighting spam defensively
Fighting
spam defensively
Chapter 16 of the Anti Spam Tool Kit focuses on defending
against unwanted e-mail. You'll learn about specific network and IT
management strategies that reduce the threat spam poses to your
organization.
(Reproduced from the book Anti Spam Took Kit, ISBN 007223167X ,
Copyright 2004, McGraw-Hill Companies. Reproduced by permission of
McGraw-Hill, Two Penn Plaza, New York, NY 10121. Written permission
from McGraw-Hill is required for all other uses. Click
here for a detailed description and to learn how to purchase this
title.)
Download
"Anti Spam Toolkit Chapter 16" here.
Network Security: The Complete Reference, Chapter 10
Featured July 19-23
Network device security
Chapter
10 of Network security: The complete reference by Mark
Rhodes-Ousley, Roberta Bragg and Keith Strassberg focuses on using
routers and switches to increase the security of the network as well as
providing appropriate configuration steps for protecting the devices
themselves against attacks. (Reproduced from the book Network security: The
complete reference, ISBN 0072226978, Copyright 2004, McGraw-Hill
Companies, Two Penn Plaza, New York, NY 10121. Written permission from
McGraw-Hill is required for all other uses. Click
here for a detailed description and to learn how to purchase this
title.)
Download " Network Security: The Complete Reference - Chapter 10" here.
Designing Network Security - Chapter 5
Threats in an enterprise network
Featured July 12-16
This chapter helps you identify which areas of the network are more susceptible to network intruders and who is the common attacker. The common trend in the past has been to trust users internal to the corporate network and to distrust connections originating from the Internet or from remote access networks using virtual private networks (VPNs), dial-in modems, and Integrated Services Digital Network (ISDN) lines. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation. However, trust must also be weighed with reality. (Reproduced from the book Designing Network Security, ISBN 1587051176, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)
Download "Designing Network Security - Chapter 5" here.
Network Security Architectures, Chapter 6
General design considerations
Featured July 1-9
Whether your background is security or networking, you can use this chapter to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations. (Reproduced from the book Network Security Architectures, ISBN 158705115X, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)
Download
"Network Security Architectures: General design considerations -
Chapter 6" here.
This was first published in June 2004
Network Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation