Enterprise Internetworking and Security: Uncommon Solutions for the Technical Professional

Overview

The Concise Guide to Enterprise Internetworking and Security will provide network professionals with the information they need to securely design and maintain an efficient and scaleable Internet connection. It will not only include planning solutions, but office bandwidth delivery technologies, security practices, hardware considerations and testing as well. The Concise Guide to Enterprise Internetworking and Security provides specific knowledge that is accumulated through the experiences of the authors. This ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (13) from $1.99   
  • New (5) from $9.92   
  • Used (8) from $0.00   
Close
Sort by
Page 1 of 1
Showing 1 – 4 of 5
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$9.92
Seller since 2008

Feedback rating:

(169)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
0789724200 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER

Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$13.00
Seller since 2006

Feedback rating:

(339)

Condition: New
2000 Paperback 789724200. Brand New; BRAND NEW.

Ships from: Northbrook, IL

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$37.45
Seller since 2014

Feedback rating:

(273)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$45.00
Seller since 2014

Feedback rating:

(164)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 4 of 5
Close
Sort by
Sending request ...

Overview

The Concise Guide to Enterprise Internetworking and Security will provide network professionals with the information they need to securely design and maintain an efficient and scaleable Internet connection. It will not only include planning solutions, but office bandwidth delivery technologies, security practices, hardware considerations and testing as well. The Concise Guide to Enterprise Internetworking and Security provides specific knowledge that is accumulated through the experiences of the authors. This book will provide expert information on: TCP/IP and Related Protocols, WAN Bandwidth, Security Concepts, Hardware, Connection Requirements, Design Considerations, Implementation of Security, and Testing and Validation. The Concise Guide to Enterprise Internetworking and Security discusses the theory behind secure and productive internetworking. This title takes into consideration that the components (i.e. vendor, situation, and equipment) will vary. The concepts behind a successful and secure Internetwork will not.
Read More Show Less

Editorial Reviews

Booknews
Provides advanced users with information needed to design, implement, and maintain a large-scale WAN connection from the desktop to the telco. Coverage includes TCP/IP and related protocols, WAN bandwidth delivery, security concepts, choosing an ISP, design considerations, testing, and validation. Although material is platform independent, it covers specifics for dealing with multiple network operating systems such as Windows 2000, Linux, and Sun Solaris. Cassidy is a network engineer at the University of Pennsylvania. Dries is a network and security architect in the private sector. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780789724205
  • Publisher: Que
  • Publication date: 12/13/2000
  • Series: Concise Guides Series
  • Pages: 295
  • Product dimensions: 7.42 (w) x 9.13 (h) x 0.72 (d)

Table of Contents

Introduction.
About Security. Layout of This Book. Where to Go for More Information.

1. TCP/IP and Related Protocols.
How Data Travels Across Networks. The Monolithic Versus Layered Method of ApplicationDesign. The OSIModel.
The Physical Layer. The Data Link Layer. The Network Layer. The Transport Layer. The Session Layer. The Presentation Layer. The Application Layer.
TCP/IP and the Internet Layer Model. Mapping TCP/IP to the OSIModel. The Basics of Layer. Address Resolution Protocol. Connection Versus Connectionless Communication. TCP/IP.
Making TCPConnections. IPAddressing. IPAddress Classes. Routing.
User Datagram Protocol. IPPacket Headers.
Telnet. HTTP. SMTP. FTP. DNS. Internet Control Message Protocol (ICMP). Ping.
Internet Protocol Version 6 (IPv6) and ICMPv6.

2. Understanding WAN Bandwidth Delivery.
Introduction to Bandwidth Delivery: How the Computer Crashed into the Telephone.
Packet Switched Versus Circuit Switched Networks. The Telco Engineers Versus the Network Engineers.
Analog Modems. Hierarchy of Dedicated Digital Services.
Physical Properties. Signal Encoding. DS0: The One True Standard. DS1: the Ever Popular.
The T1 Frame.
Fractional. T3.
Fractional. SONET. ISDN.
Basic Rate Interface (BRI). Primary Rate Interface (PRI). ISDN Layer 1-Physical. ISDN Layer 2-Data Link. ISDN Layer 3-Network. Digital Subscriber Line (XDSL, aDSL, sDSL). ADSL. R-ADSL. HDSL. IDSL. VDSL. SDSL. Splitterless DSL or DSL-Lite. Loading Coils.
Cable Modems.
Shared Network Technologies. More on Sharing.
Frame Relay.
Circuit Switched Versus Packet Switched. Advantages of Frame Relay. Components of Frame Relay. Congestion and Delay.
Asynchronous Transfer Mode (ATM).
It's All About Timing. Mitosis. Why 53 Octets? ATM OSI Layers. ATM Adaptation Layers. Guaranteed Service Levels.
Wireless. Hardware Requirements for Different Networks.

3. Security Concepts.
Who Is Threatening Your Data? Common Types of Attacks.
Web Defacement. Unsolicited Commercial Email (UCE or Spam). Spoofing. Denial of Service (DoS).
Important Security Terminology.
Authentication. Authorization. Integrity. Encryption.
Of Public Keys and Private Washrooms.
X.509 Certificates. Pretty Good Privacy (PGP) Keys.
Public Key Infrastructure (PKI). Security Hardware.
Token-Based Cards. Smart Cards.
Security Through Obscurity.
World View Versus Internal View.
Different Layers of Security.
No Security. Hardened Security. Firewalls. Demilitarized Zone. Intrusion Detection Systems.
Different Kinds of Access Control.
Packet Screening. Circuit Proxies. Application Gateways. Stateful Inspection.
Network Address Translation.

4. Defining Connection Requirements.
Getting an Idea of What Your Users Need. Internet Applications Provided to the Internet. Sizing Your Internet Connection.
Buying the Skills. Hiring the Skills. Earning the Skills. Bandwidth Doesn't Always Mean Performance.
Criticality of Internet Connection.
Hosting All Servers On-Site. Critical Outbound Access, No Critical On-Site Servers. Bandwidth-on-Demand: Out of Speed.
Additional Services.
Virtual Private Networks. Remote Access. Multimedia, Multicasting, and the MBONE.
Security. Cost.
Customer Premises Equipment. Firewalls and Servers. Where to Cut Corners.
Reiteration Is Your Constant Companion. Connection Requirements Checklist.

5. Choosing an ISP.
Selecting the Right ISP Is a Critical Decision. NSP or ISP?
Network Access Point (NAP). Metropolitan Area Exchange (MAE). The Tiers of Babel.
Cost.
Paying by Bandwidth. Paying by Usage. Extras. Reimbursements for Network Downtime.
Reliability/Reputation.
Peer Survey.
Capacity (Can Your ISP Meet Your Needs?). Installation and Setup Services ISPs Offer.
Bandwidth Options. Web Hosting. Mail Hosting. Knowledge Services (Help Desk/Consulting). Managing Equipment Lease. IP Address Blocks. Co-locate: Your Equipment, the ISP's Building. Co-Location Considerations. Extended Protocols and Services.
Provisioning a WAN. Customer Premises Equipment. Managed Services.
Managing Your Router. Managing Your Firewall. Managing VPN Connectivity. Offering Proxy Services. Domain Name Registration. DNS Mail Exchanger Records.

6. Consulting, Consultants, and Contractors.
Consultants, Contractors, and Projects. Can You Do It All Yourself? From the Inside.
Before You Hire a Consultant. Before You Hire a Contractor. What Tasks Should You Farm Out? Questions You Should Ask Your Hired Help. Bonding and Insurance.
The Request For Proposal.
Agreeing Parties. Stated Objectives. Deliverables. Scope of Services. Risks. Requirements. Coordinators. Issues and Change Management. Timeline and Costs. Additional Costs. Defining a Statement of Work.
Segment the Project into Stages.
Information Collection. Analysis and Evaluation. Recommendation. Implementation. Acceptance and Transition.

7. Design Considerations.
Before Building Your Network. Getting Your Service from the Wall Through Hall.
Terminating the Telecom Demarcation. Wiring Contractors.
Configuring Clients for a New Connection.
Proxy Configuration. IP Addressing. Internet Software. Standard Build Process.
Defining IPArchitecture. Multi-Protocol Network Requirements.
Tunneling of Protocols Within IP. Tunneling IPv6 in IPv4.
Availability, Capacity, and Reliability.
Bandwidth, Latency, and Throughput. Backup Circuits. On-Demand Circuits.
Remote Access Policy.
Doing Away with Dialups.

8. Assessing Your Security Needs.
Build an Adaptable Infrastructure. The Tao of Security: Simplicity. Service Assessment.
Serving the World. Services Allowed from the Internet. The Special Case of FTP.
Rules, Rulesets, and Rulebases.
Rule Order. Performance-Tuning Your Firewall.
Turning Security Policy into Security.
Security Policy. Default Stance. Security Architecture. Security Architecture to Rulebase. Change Management. Harden All Your Servers. Drop Source Routed Traffic. Drop Directed Broadcast Traffic. Lock Down Your DNS Servers. Disable Relaying and Other Information Features on Your SMTP Server.
Sample Prototype Designs.
Packet Filter Router Only. Packet Filter Router with a DMZ. Router/Firewall and DMZ Revisited with VPN.

9. Getting Connected.
Equipment Selection.
Router Selection. CSU/DSU Selection.
Staging the Hardware.
Setting Up the Hardware: Out of the Box and Onto the Wall. Connect and Configure the CSU/DSU. B8ZS. Connect and Configure the Router. Burn In.

10. Implementing Security.
Setting Proper Expectations. Hardening Systems.
Windows NT 4.0. Windows 2000 Server. Lock Down Your DNS Server. Application-Specific Hardening. UNIX/Linux Systems. Tweak Your Network Configurations for Security.
Remote Log Server.
UNIX/Linux. Windows NT and 2000. EventLogs.
Sample Packet Filter Router Only. Sample Packet Filter Router with a DMZ. Sample Packet Filter Router with a Firewall and DMZ.
Minimal Router Filtering. Starting Free and Clear. Allow Internal Network Traffic Outbound to the Internet. Protect the Firewall. Allow Only Internal Admin Access to the Firewall. Drop Traffic You Do Not Want Logged. Services Provided to the Internet. Drop DMZ Initiated Traffic. Default Policy of Drop Everything.
Sample Packet Filter Router with a Firewall, DMZ, and VPN Security Gateway.
Bringing It All Together. Check Point FireWall-1 on Windows NT. Linux 2.2 and ipchains. OpenBSD 2.7 and IP Filter.

11. Testing and Validation.
Is Your Network Working Properly? Assembling the Tools.
Software Utilities. Hardware Sniffers. Network Analyzers/Protocol Analyzers.
Testing Your Routing.
Using ARP. Default Route.
Testing Your Required Services. Testing Your Exposed Services. Testing Your Security.

12. Managing Your Internet Connection.
Evaluating New Services.
Sign Up for BUGTRAQ. Sign Up for NTBUGTRAQ.
Checking for Security Breaches.
Periodic Vulnerability Assessment. Tools for Simple Intrusion Detection.
Monitoring and Baselining.
What to Baseline. How Long Should Baselining Last? Peaks Versus Averages. Identify the Sources of Peaks. Log Monitoring. Monitoring Usage.
Planning for the Future.
What's Going to Break First? Appraising New Technologies.

13. Moving to a New ISP.
Equipment Return. IPAddressing-The Return of Leased Numbers. DNS Modifications. New Equipment Purchases. Transition Period. Security Mail Servers. Upgrades.

Index.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)