1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Resources pptx

4 320 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Resources
Thể loại Appendix
Năm xuất bản 2002
Định dạng
Số trang 4
Dung lượng 57,17 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

It also provides links to sites where you can find more detailed information on topics that are out of the scope of this book—including IPSec, RADIUS/TACACS+, and intrusion detection.. W

Trang 1

Resources

This appendix lists resources that you may find useful when securing your routers, systems, and networks It also provides links to sites where you can find more detailed information on topics that are out of the scope of this book—including IPSec, RADIUS/TACACS+, and intrusion detection

Web Sites

http://www.cisco.com

This site provides the most current information on Cisco routers and products Cisco’s online technical documentation is excellent and should usually be the first stop for questions involving Cisco routers

http://www.cisco.com/go/psirt

A direct link to Cisco’s Product Security Incident Response Team (PSIRT) and a list of all Cisco IOS vulnerabilities

http://www.cisco.com/cgi-bin/Support/FeatureNav/FN.pl

Cisco’s feature navigator It helps determine what IOSversions and hardware support features such as IPSec and SSH

http://nsa1.www.conxion.com/cisco

NSA-recommended guides for securing Cisco routers

http://nsa1.www.conxion.com

Additional NSA-recommended security guides

http://www.securityfocus.com

A security site with excellent news, articles, tools, and vulnerability listings

SecurityFocus is also home to the Bugtraq vulnerability forum.

http://www.cert.org

The original Computer Emergency Response Team (CERT) based out of Carn-egie Mellon CERT is an excellent resource on vulnerabilities, fixes, and incident response

Trang 2

162 | Appendix E: Resources

http://www.sans.org

The System Administrator and Network Security web site It is an excellent source for research and education in the area of information security

http://www.gocsi.com

The Computer Security Institute web site he source of the annual FBI/CSI com-puter crime and security survey

http://web.mit.edu/kerberos/www

The MIT Kerberos web site

http://www.de.easynet.net/tacacs-faq

The TACACS frequently asked questions web site (with a focus on Cisco)

http://www.ietf.org/html.charters/OLD/radius-charter.html

The IETF RADIUS workgroup with links to RFCs and RADIUS information

http://www.ietf.org/html.charters/ipsec-charter.html

The IETF IPSec working group page with links to IPSec drafts and RFCs

http://www.rfc-editor.org

A site where you can search RFCs by number, topic, and keyword

http://www.simpleweb.org

A site with links to more information about SNMP

http://net-snmp.sourceforge.net

A web site for the Net-SNMP open source SNMP server and client software

http://www.liquifried.com/docs/security/reservednets.html

A large listing of IANA-reserved networks that can be included in antispoofing filters

http://www.ietf.org/html.charters/syslog-charter.html

The IETF syslog working group with links to drafts and RFCs.

http://www.isaca.org

The Information Systems Audit and Control Association web site This organiza-tion sponsors the Certified Informaorganiza-tion Systems Auditor (CISA) certificaorganiza-tion

Books

Boney, James Cisco IOS in a Nutshell O’Reilly & Associates, 2001.

This book consolidates the most important commands and features of IOSinto a single volume

Garfinkel, Simson and Gene Spafford Practical Unix and Internet Security, Second

Edition O’Reilly & Associates, 1996

This classic reference is the definitive source of information on securing both standalone Unix systems and those connected to the Internet

Trang 3

Books | 163

Kaeo, Merike Designing Network Security Cisco Press, 1999.

Cisco’s book on the fundamentals of Cisco network security

Norberg, Stefan Securing Windows NT/2000 Servers for the Internet O’Reilly &

Associates, 2000

This concise guide simplifies the job of securing a Windows server by paring down installation and configuration instructions into a series of checklists

Schneier, Bruce Applied Cryptography John Wiley & Sons, 1995.

An excellent reference and introduction to cryptography and standard encryp-tion techniques and formulas

Sedayao, Jeff Cisco IOS Access Lists O’Reilly & Associates, 2001.

This book focuses on a critical aspect of the Cisco IOS—access lists, which are central to securing routers and networks

van Wyk, Kenneth and Richard Forno Incident Response O’Reilly & Associates,

2001

This book combines technical information with guidelines for administrative planning so that organizations can map out their responses to computer incidents

Wenstrom, Michael Managing Cisco Network Security Cisco Press, 2001.

Cisco’s overview of network security using Cisco products by Cisco Systems

Zwicky, Elizabeth, Simon Cooper, and Brent Chapman Building Internet Firewalls,

Second Edition O’Reilly & Associates, 2000

An excellent book on the complexities of designing and building firewalls

Ngày đăng: 21/12/2013, 18:15

TỪ KHÓA LIÊN QUAN

w