Chapter of the Week - July '04

This month we bring you network security excerpts.



SearchNetworking.com Chapter of the Week

There's no doubt about it -- SearchNetworking.com readers love our weekly featured chapter downloads. This month you'll find an assortment of chapters on network security.

Check out this week's featured book:

You can download this week's chapter now. Be sure to bookmark this Chapter of the Week page and check back each week to access our upcoming chapters.




Anti Spam Toolkit, Chapter 16
Fighting spam defensively
Networking

Fighting spam defensively
Chapter 16 of the Anti Spam Tool Kit focuses on defending against unwanted e-mail. You'll learn about specific network and IT management strategies that reduce the threat spam poses to your organization. (Reproduced from the book Anti Spam Took Kit, ISBN 007223167X , Copyright 2004, McGraw-Hill Companies. Reproduced by permission of McGraw-Hill, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)
Download "Anti Spam Toolkit Chapter 16" here.



Network Security: The Complete Reference, Chapter 10
Featured July 19-23
Network device security
Networking

Chapter 10 of Network security: The complete reference by Mark Rhodes-Ousley, Roberta Bragg and Keith Strassberg focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. (Reproduced from the book Network security: The complete reference, ISBN 0072226978, Copyright 2004, McGraw-Hill Companies, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)

Download " Network Security: The Complete Reference - Chapter 10" here.



Designing Network Security - Chapter 5
Threats in an enterprise network
Featured July 12-16
Networking

This chapter helps you identify which areas of the network are more susceptible to network intruders and who is the common attacker. The common trend in the past has been to trust users internal to the corporate network and to distrust connections originating from the Internet or from remote access networks using virtual private networks (VPNs), dial-in modems, and Integrated Services Digital Network (ISDN) lines. It is important to place trust in the employees internal to the network and in authorized people trying to use internal network resources from outside the corporation. However, trust must also be weighed with reality. (Reproduced from the book Designing Network Security, ISBN 1587051176, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)

Download "Designing Network Security - Chapter 5" here.



Network Security Architectures, Chapter 6
General design considerations
Featured July 1-9
Networking

Whether your background is security or networking, you can use this chapter to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations. (Reproduced from the book Network Security Architectures, ISBN 158705115X, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)

Download "Network Security Architectures: General design considerations - Chapter 6" here.

This was first published in June 2004

Dig deeper on Network Security Best Practices and Products

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close