Chapter of the Week - November '04

This month we present you chapter downloads on network security. This week we feature a brand new book from Cisco Press -- Cisco Router Firewall Security, Chapter 17.



SearchNetworking.com Chapter of the Week

This month we present you chapter downloads on network security.

Check out this week's featured book:

You can download this week's chapter now. Be sure to bookmark this Chapter of the Week page and check back each week to access our upcoming chapters. Here's what we have lined up for November:

Cisco Router Firewall Security, Chapter 17
Featured Nov. 22-30
DoS protection
Networking

Chapter 17 of Cisco Router Firewall Security by Richard Deal explores the basics of dealing with DoS attacks. When you are experiencing a DoS attack, one of the first things you need to do is find out the actual kind of DoS attack that is affecting your network. As you will see a variety of options are available to you, including examining the CPU utilization of your routers, using ACL statements with logging parameters, and using NetFlow. This chapter offers solutions, including TCP Intercept, CBAC, and rate limiting. (Reproduced from the book Cisco Router Firewall Security, ISBN 1587051753, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.))
Download " Cisco Router Firewall Security - Chapter 17" here.



Network Security: The Complete Reference, Chapter 10
Featured Nov. 15-19
Network device security
Networking

Chapter 10 of Network security: The complete reference by Mark Rhodes-Ousley, Roberta Bragg and Keith Strassberg focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. (Reproduced from the book Network security: The complete reference, ISBN 0072226978, Copyright 2004, McGraw-Hill Companies, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)
Download "Network Security: The Complete Reference - Chapter 10" here.



Gray Hat Hacking: The Ethical Hacker's Handbook, Chapter 4
Pen-Testing Process
Featured Nov. 8-12
Networking

Chapter 4 of Gray Hat Hacking: The Ethical Hacker's Handbook covers the non-technical and process aspects of ethical hacking. It discusses the difference between types of assessments, how to get started and continues with steps to a performing a successful assessment. (Reproduced from the book Gray Hat Hacking: The Ethical Hacker's Handbook, ISBN 0072257091, Copyright 2004, McGraw-Hill Companies. Reproduced by permission of McGraw-Hill, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)

Download your copy of Gray Hat Hacking: The Ethical Hacker's Handbook, Chapter 4 here.



The Tao of Network Security Monitoring, Beyond Intrusion Detection, Chapter 11
Best Practices
Featured Nov. 1-5
Networking

Chapter eleven of The Tao of Network Security Monitoring, Beyond Intrusion Detection, Chapter 11 by Richard Bejtlich presents best practices for assessment, protection, detection, and response, as far as network security monitoring (NSM) is concerned. While elements of NSM best practices appear throughout the book, this chapter focuses exclusively on the mind-set needed to conduct NSM operations. (Reproduced from The Tao of Network Security Monitoring, Beyond Intrusion Detection, ISBN 0321246772, Copyright 2005 with permission from Pearson publishing as Addison-Wesley Professional. Click here for a detailed description and to learn how to purchase this title.)

Download your copy of The Tao of Network Security Monitoring, Beyond Intrusion Detection, Chapter 11 here.

This was first published in October 2004
This Content Component encountered an error

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close