Bulletproofing TCP/IP-based Windows NT/2000 Networks
โ Scribed by Gilbert Held(auth.)
- Year
- 2001
- Tongue
- English
- Leaves
- 304
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.
- Covers how TCP/IP operates and how TCP/IP attacks occur.
- Detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000- host on such networks against different attack methods.
- Describes a new attack method, 'script-form attack', which could cause a company financial problems, and its prevention.
- Uses practical real-world examples of methods used to block potential attacks.
Aimed at TCP/IP network managers, LAN admiistrators, Windows NT/2000 administrators and network professionals. It can also be used for high level undergraduate and graduate electrical engineering and computer science courses covering network security.Content:
Chapter 1 Introduction (pages 1โ18):
Chapter 2 The TCP/IP Protocol Suite (pages 19โ84):
Chapter 3 Network Attack Methods (pages 85โ104):
Chapter 4 The Security Role of the Router (pages 105โ153):
Chapter 5 The Role of the Firewall (pages 155โ181):
Chapter 6 The Role of the Virus Scanner and Encryption (pages 183โ204):
Chapter 7 Host Attack Methods (pages 205โ224):
Chapter 8 Working with Windows (pages 225โ262):
Chapter 9 The Role of the Scanner (pages 263โ285):
๐ SIMILAR VOLUMES
Windows NT TCP/IP Network Administration is a complete guide to setting up and running a TCP/IP network on Windows NT. Windows NT and TCP/IP have long had a close association, and this is the first book to focus exclusively on NT networking with TCP/IP. It starts with the fundamentals--what the
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is ''supposed'' to work is not enough for today's network managers. In this book, readers wil
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will