Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 13 von 1039

Details

Autor(en) / Beteiligte
Titel
Dr. Tom Shinder's ISA server 2006 migration guide [electronic resource]
Auflage
1st edition
Link zum Volltext
Beschreibungen/Notizen
  • Includes index.
  • Front Cover; Dr. Tom Shinder's ISA Server 2006 Migration Guide; Copyright Page; Lead Authors; Contributing Authors; Contents; Introduction; Chapter 1: Network Security Basics; Introduction; Security Overview; Defining Basic Security Concepts; Knowledge is Power; Think Like a Thief; The Intrusion Triangle; Removing Intrusion Opportunities; Security Terminology; Addressing Security Objectives; Controlling Physical Access; Physical Access Factors; Protecting the Servers; Keeping Workstations Secure; Protecting Network Devices; Securing the Cable; Safely Going Wireless; Have Laptop, Will Travel
  • The Paper ChaseRemovable Storage Risks; Physical Security Summary; Preventing Accidental Compromise of Data; Know Your Users; Educate Your Users; Control Your Users; Preventing Intentional Internal Security Breaches; Hiring and Human Resource Policies; Detecting Internal Breaches; Preventing Intentional Internal Breaches; Preventing Unauthorized External Intrusions; External Intruders with Internal Access; Tactical Planning; Recognizing Network Security Threats; Understanding Intruder Motivations; Recreational Hackers; Profit-motivated Hackers; Vengeful Hackers; Hybrid Hackers
  • Classifying Specific Types of AttacksSocial engineering attacks; What is social engineering?; Protecting your network against social engineers; Denial of Service (DOS) Attacks; Distributed Denial of Service attacks; DNS DOS attack; SYN attack/LAND attack; Ping of Death; Teardrop; Ping Flood (ICMP flood); SMURF attack; UDP bomb or UDP flood; UDP Snork attack; WinNuke (Windows out-of-band attack); Mail bomb attack; Scanning and Spoofing; Port scan; IP half scan attack; IP Spoofing; Source Routing attack; Other protocol exploits; System and software exploits; Trojans, viruses and worms; Trojans
  • VirusesWorms; Designing a Comprehensive Security Plan; Evaluating Security Needs; Assessing the type of business; Assessing the type of data; Assessing the network connections; Assessing management philosophy; Understanding management models; Understanding Security Ratings; Legal Considerations; Designating Responsibility for Network Security; Responsibility for Developing the Security Plan and Policies; Responsibility for Implementing and Enforcing the Security Plan and Policies; Designing the Corporate Security Policy; Developing an Effective Password Policy; Password Length and Complexity
  • Who creates the password?Password Change Policy; Summary of Best Password Practices; Educating Network Users on Security Issues; Summary; Chapter 2: ISA Server 2006 Client Types and Automating Client Provisioning; Introduction; Understanding ISA Server 2006 Client Types; Understanding the ISA Server 2006 SecureNAT Client; SecureNAT Client Limitations; SecureNAT Client Advantages; Name Resolution for SecureNAT Clients; Name Resolution and ""Looping Back"" Through the ISA Server 2006 Firewall; Understanding the ISA Server 2006 Firewall Client
  • Allows Strong User/Group-Based Authentication for All Winsock Applications Using TCP and UDP Protocols
  • Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange
  • English
Sprache
Englisch
Identifikatoren
ISBN: 1-281-05572-7, 9786611055721, 0-08-055551-9
OCLC-Nummer: 476129266, 354466107, ocm354466107
Titel-ID: 9925194428606463
Format
1 online resource (671 p.)
Schlagworte
Firewalls (Computer security), Internet, Systems migration