Sunday, January 18, 2009

WAN Technologies CCNA 4 Companion Guide or Extrusion Detection

WAN Technologies CCNA 4 Companion Guide

Author: Allan Reid

WAN Technologies CCNA 4 Companion Guide is the official supplemental textbook for version 3.1.1 of the CCNA® 4 course in the Cisco® Networking Academy® Program. The author has completely rewritten the Companion Guide to provide a fresh, complementary perspective on the online course content. The book covers all the topics in the course and then provides additional examples and alternative approaches to individual topics–all to aid the learning process and lock in your understanding of basic networking concepts and technologies.

New and improved features help you study and succeed in this course:

  • Chapter objectives: Review core concepts by answering the questions at the beginning of each chapter.
  • Key terms: Refer to the updated lists of networking vocabulary introduced in each chapter and turn to the highlighted terms in context.
  • Glossary: Consult the all-new glossary with more than 300 terms.
  • Check Your Understanding questions and answer key: Evaluate your readiness with the updated end-of-chapter questions that match the style of questions that you see in the online course assessments. The answer appendix explains each answer.
  • Challenge questions: Challenge yourself with review questions designed to be similar to the complex questions you might see on the CCNA exam. The answer appendix explains each answer.



New interesting textbook: La conception de la Société Globale

Extrusion Detection: Security Monitoring for Internal Intrusions

Author: Richard Bejtlich

Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks

Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates.

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument networks to detect anomalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur.

Bejtlich's The Tao of Network Security Monitoring earned acclaim as the definitive guide to overcoming external threats. Now, in Extrusion Detection, he brings the same level of insight to defending against today's rapidly emerging internal threats. Whether you're an architect, analyst, engineer, administrator, or IT manager, you face a new generation of security risks. Get this book and protect yourself.

Coverage includes

  • Architecting defensible networks with pervasive awareness: theory, techniques, and tools
  • Defending against malicious sites, Internet Explorer exploitations, bots, Trojans, worms, and more
  • Dissecting session andfull-content data to reveal unauthorized activity
  • Implementing effective Layer 3 network access control
  • Responding to internal attacks, including step-by-step network forensics
  • Assessing your network's current ability to resist internal attacks
  • Setting reasonable corporate access policies
  • Detailed case studies, including the discovery of internal and IRC-based bot nets
  • Advanced extrusion detection: from data collection to host and vulnerability enumeration
About the Web Site

Get book updates and network security news at Richard Bejtlich's popular blog, taosecurity.blogspot.com, and his Web site, bejtlich.net.





Table of Contents:
Ch. 1Network security monitoring revisited3
Ch. 2Defensible network architecture25
Ch. 3Extrusion detection illustrated79
Ch. 4Enterprise network instrumentation105
Ch. 5Layer 3 network access control137
Ch. 6Traffic threat assessment175
Ch. 7Network incident response219
Ch. 8Network forensics245
Ch. 9Traffic threat assessment case study279
Ch. 10Malicious bots307
App. ACollecting session data in an emergency
App. BMinimal snort installation guide
App. CSurvey of enumeration methods
App. DOpen source host enumeration

No comments:

Post a Comment