Download Practical Guide for Implementing Secure Intranets and by Kaustubh M Phaltankar PDF

By Kaustubh M Phaltankar

This quantity presents hands-on technique for designing powerful network-level protection platforms in your company intranet or extranet. utilizing real-world examples and referencing intranet and extranet expertise, this guidebook for IT execs indicates how one can configure community and safeguard parts akin to routers, switches, servers and firewalls to accomplish top-notch defense. elements of powerful defense are significantly reviewed intimately, together with varieties of firewalls, corresponding to Packet Filters, Stateful and alertness point proxy units, and encryption schemes, comparable to DES, RSA, and IPSEC. safe facts delivery and knowledge entry also are mentioned, in addition to using distant clever brokers on community units and servers. The publication discusses find out how to overview safety innovations in accordance with necessities akin to fee, complexity, and function, and community and repair administration concerns. It seeks to shut the distance among conception and implementation via that includes designated case experiences and an interactive process with diagrams and configurations.

Show description

Read Online or Download Practical Guide for Implementing Secure Intranets and Extranets (Artech House Telecommunications Library) PDF

Similar network security books

Guide to Computer Forensics and Investigations (3rd Edition)

Grasp the abilities essential to release and entire a winning machine research with the up-to-date fourth version of this well known publication, advisor TO machine FORENSICS AND INVESTIGATIONS. This source publications readers via undertaking a high-tech research, from buying electronic facts to reporting its findings.

The Executive MBA in Information Security

Based on the Brookings Institute, an organization’s info and different intangible resources account for over eighty percentage of its industry price. because the fundamental sponsors and implementers of knowledge safety courses, it's crucial for these in key management positions to own an excellent realizing of the continuously evolving primary options of knowledge safeguard administration.

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Community safety has develop into a massive a part of company IT method and safeguarding the entire nooks and crannies of your community might be well timed and costly. This e-book offers information regarding easy methods to use unfastened Open resource instruments to construct and deal with an Intrusion Detection method. Rehman offers targeted information regarding utilizing snigger as an IDS and utilizing Apache, MySQL, Hypertext Preprocessor and ACID to investigate intrusion information.

Information Security and Cryptology -- ICISC 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

This booklet constitutes the completely refereed post-conference lawsuits of the sixteenth overseas convention on info protection and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised complete papers provided including 2 invited talks have been conscientiously chosen from 126 submissions in the course of rounds of reviewing.

Additional resources for Practical Guide for Implementing Secure Intranets and Extranets (Artech House Telecommunications Library)

Sample text

This includes IPSec, GRE tunnels, PPTP, and L2TP tunneling protocols for LAN-to-LAN and dial-up VPN connections over the public Internet. Chapter 7, Case Studies: The case studies provide the real-world implementations of intranet and extranet network and security infrastructure. The case studies provide installation and configuration details for routers, switches, remote access devices, Internet VPNs with IPSec, VPN clients, VPN servers, frame relay PVCs, and SNA gateways in a legacy environment.

An example of such collaboration would be that a vendor of XYZ Corporation provides support information directly to a partner of XYZ Corporation, while the partner collaborates with the XYZ Corporation regarding the rollout of a new product. To accomplish the goals of such an extranet, the XYZ Corporation can set up a collaborative working environment by deploying collaborative extranet applications with shared and routable information repositories that can be accessed by all interested parties.

The firewall at each location protects the individual site and enables organizations to manage the interface between the private and public part of the network. Some firewalls also enable setup of virtual private networks over the Internet. The end-to-end VPN connections are shown by dotted lines. 4. We will look at different types of firewalls and VPN components in Chapter 6. The remote LAN access servers have been positioned closer to the user in the network, thus saving organizations the cost of 800 long distance calls.

Download PDF sample

Rated 4.01 of 5 – based on 42 votes