Items related to The Process of Network Security: Designing and Managing...

The Process of Network Security: Designing and Managing a Safe Network - Softcover

 
9780201433173: The Process of Network Security: Designing and Managing a Safe Network

Synopsis

Presenting the process behind securing an enterprise network, this text includes information on the modelling behind the implementation. It offers a wide-ranging perspective on the many issues surrounding security within the workplace.

"synopsis" may belong to another edition of this title.

From the Inside Flap

A friend of mine said to me the other day that he wanted his old Internet back again. Things worked as well as they needed to. Everyone was nice. You could send mail to people you'd never met, and you'd typically get a nice reply. People gained access to different machines all around the world, which was given more or less freely, so you could log into those machines and see what they'd accomplished this month or just chat with friends. If something needed to be done, a bunch of smart people got together and did it, without too much fuss or bother. It was a nice place, for the most part.

He really wasn't serious, this friend of mine. He makes his living using the Internet we have today and by speaking about the Internet we'll have tomorrow. He gets most of his news from CNN's Web site, and the computer industry-specific sites such as Slashdot and Freshmeat. I can't remember the last time he traveled without a laptop; you can send him e-mail anywhere he travels, and (if you get past his filtering software) he'll answer it from Tokyo or Singapore or Paris. The Internet is probably the most complicated thing created by the human race, and yet it is (relatively speaking, of course) easy to use and just about everywhere you'd want it to be.

But I understand his point. The Internet isn't the friendly place it used to be. What was once a small town, where neighbors were friendly and you could leave your door unlocked, is now the largest (virtual) community in the world, and it's growing bigger every day. There are bad parts of town, and there are muggers and thieves and con men, just as in every other city on Earth. You can't get beaten up, but you can be robbed of your time and in some cases of your money.

For all that, the Internet is probably the safest community of its size ever in existence. But that isn't something to take much comfort in. The reason I say this is that I and other members of my profession are called on to look at the security of sites on the Internet from time to time. I know the Internet is mostly safe, because the doors to most places are still unlocked and yet major catastrophes have not happened. Reasoning from that, it appears that most of the people on the Internet are not Bad Guys. Not yet, anyway.

Of course, this can change at any time. And it has begun to. The 1990s saw an ever-growing number of people systematically trolling for computer weaknesses. These people are not trying to attack a specific site; rather, they are just fishing to see what they can catch. The late 1990s saw the beginning of Internet attacks for political reasons. As this book was written, the news media referred to the conflict in Kosovo as the "First Internet War" because of several hostile incidents that occurred and also because much of the unofficial communication between sides was taking place over the Internet.

The Internet is becoming a dangerous place. But it is important to see this in perspective. Any large community has its bad neighborhoods, robberies, muggings and trouble spots, but that doesn't mean it is impossible to live and work there safely. The trick is to keep your eyes open, take reasonable precautions, and not act foolishly. The same rules apply to the Internet.

But computer security means far more these days than the ability of one person to protect himself or herself from the dangers that can arise on the Internet. It's one thing to protect yourself. It's a very different thing indeed to protect a hundred computers, or a thousand, or ten thousand.

This book is intended for the people facing that formidable challenge and the people who will assist in such an endeavour. It is not a tutorial on how to become a hacker. Nor is it a technical manual on how to run a large computer network. Many other sources cover those subjects, for better or worse. My goal here is to give a person charged with the responsibility of running the network security for a large organization a tool for understanding the language and practices of network and computer security, and to provide some hints along the way to save some time and some scraped knuckles. As with any large project, there are many ways to approach these issues. I don't claim that this book is an exhaustive survey of all possible ways. It is, however, a collection of good methodology and tips and tricks, with some warning signs at the rough spots, that have worked for me.

So who am I? Well, I am an electrical engineer by training, but I was swept up into computer science in my high school and college years. My first experience with the Internet was in the late 1970s, when I discovered that I could connect from Carnegie-Mellon University, where I went to school, to a machine in London, England, over something called the ARPANET, which was just appearing on the scene at that time. Like many others at CMU, I worked in the university Computer Center. Unlike many of my colleagues there, I've kept much the same job ever since, running larger and larger collections of computers and their networks at Lawrence Livermore Laboratory, Schlumberger's Palo Alto Research Center, Xerox's Palo Alto Research Center, ParcPlace Systems, and Sun Microsystems Laboratories. Along the way, I've learned a few things about keeping large collections of machines happy and healthy and about keeping the Bad Guys out and the Good Guys working. Now I find myself as the Chief Technology Officer and Vice President of Security for Pilot Network Services, Inc., a company I helped to found and whose function is to handle Internet security for our customers, a diverse collection of some of the most dynamic and interesting (as well as the largest) companies on Earth. The principles we use to run our business safely can be found in this book. That may strike you as odd, creating a book that says how we do our business, because it enables people to compete against us, using our own principles. Well, read on. If you still think it's easy, give it a shot. We welcome the competition. Acknowledgments

A great many people helped me with the production of this book, directly or indirectly, but I'd like to thank several specifically:

Dr. Martine Droulers and Dr. Celine Broggio, wonderful friends who fed me delicious food and gave me the use of their French seaside attic to finish the book. Fromage! Eileen Keremitsis, who put up with my grumbling, made sure that I wasn't working too hard, and was ready with an invitation to dinner whenever I needed one. Dennis Allison, who tempted me back into the book-writing business after a long absence, and Karen Gettman and Mary Hart of Addison-Wesley, who made sure that I stayed the course. Steve Riley, Joseph Balsama, Steve Rader, John Stewart, and Clifford Neuman, who read the entire manuscript and whose numerous and insightful comments I found very helpful. And of course, the people at Pilot Network Services, who are the hardest working and nicest bunch of security folks I've ever met.

Tom Wadlow
San Francisco, California, USA
Le Crotoy, Picardie, France, 2000 0201433176P04062001

From the Back Cover

In The Process of Network Security, security specialist Thomas A. Wadlow reveals the approaches, techniques, and best practices that effectively secure the modern workplace. Written for network managers and administrators responsible for the security of large, enterprise-wide networks, this book focuses on security as a continuous process involving vigilant daily efforts in analysis, implementation, evaluation, and maintenance. It also emphasizes that in order to truly protect the enterprise, security professionals must consider not just individual machines, but the entire system--machines, people, and procedures.

The Process of Network Security discusses the many issues involved and walks you through the specific steps of setting up a secure system, focusing on standard operating procedures and day-to-day operations and maintenance. Providing a broad perspective on the challenge of enterprise security, this book covers a wide range of topics, including:
  • Understanding the nature of attacks and attackers
  • Setting security goals
  • Creating a secure network design
  • Building a team
  • Fortifying network components
  • Implementing physical and personnel security
  • Monitoring and ordering a network
  • Discovering and handling an actual attack
  • Dealing with law enforcement authorities

You will find many experience-based observations, insights, and sound advice to point you in the right direction and to help you avoid potentially dangerous pitfalls and threats that face your network security. The book also addresses the "catch-22" that security specialists face: how to demonstrate the value of security when proof of its success cannot always be thoroughly tracked or measured.

Written in a conversational tone, The Process of Network Security conveys both the specific information and the general mindset that will enable you to anticipate, prevent, and respond to network threats.



0201433176B04062001

"About this title" may belong to another edition of this title.

  • PublisherAddison-Wesley Professional
  • Publication date2000
  • ISBN 10 0201433176
  • ISBN 13 9780201433173
  • BindingPaperback
  • Edition number1
  • Number of pages283

Buy Used

Condition: Very Good
Former library book; May have limited... Learn more about this copy

Shipping: FREE
Within U.S.A.

Destination, rates & speeds

Add to basket

Top Search Results from the AbeBooks Marketplace

Stock Image

Wadlow, Thomas
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
Used Paperback

Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.42. Seller Inventory # G0201433176I4N10

Contact seller

Buy Used

US$ 6.06
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
Used Paperback

Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.42. Seller Inventory # G0201433176I3N00

Contact seller

Buy Used

US$ 6.06
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas A.
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
Used Softcover

Seller: SecondSale, Montgomery, IL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00054632880

Contact seller

Buy Used

US$ 6.08
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Wadlow, Thomas A.
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
Used paperback First Edition

Seller: The Maryland Book Bank, Baltimore, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

paperback. Condition: Good. First Edition. Corners are bent. Used - Good. Seller Inventory # 7-S-5-0169

Contact seller

Buy Used

US$ 2.20
Convert currency
Shipping: US$ 4.20
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas:
Published by Addison Wesley Pub Co Inc, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
Used Taschenbuch

Seller: Antiquariat Armebooks, Frankfurt am Main, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Gut. 304 Seiten Addison Wesley 2000 : Thomas A. Wadlow - Perfect tb MK-14IM-8EJF Sprache: Englisch Gewicht in Gramm: 608. Seller Inventory # 80760

Contact seller

Buy Used

US$ 2.28
Convert currency
Shipping: US$ 22.32
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas A.
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
New Paperback

Seller: GoldenWavesOfBooks, Fayetteville, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0201433176

Contact seller

Buy New

US$ 22.13
Convert currency
Shipping: US$ 4.00
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas A.
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
New Paperback

Seller: GoldBooks, Denver, CO, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0201433176

Contact seller

Buy New

US$ 27.32
Convert currency
Shipping: US$ 4.25
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas A.
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
New Softcover

Seller: Front Cover Books, Denver, CO, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: new. Seller Inventory # FrontCover0201433176

Contact seller

Buy New

US$ 51.28
Convert currency
Shipping: US$ 4.30
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Wadlow, Thomas A.
Published by Addison-Wesley Professional, 2000
ISBN 10: 0201433176 ISBN 13: 9780201433173
New Paperback

Seller: Big Bill's Books, Wimberley, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. Brand New Copy. Seller Inventory # BBB_new0201433176

Contact seller

Buy New

US$ 56.25
Convert currency
Shipping: US$ 3.00
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Thomas A. Wadlow
Published by Addison Wesley, 2001
ISBN 10: 0201433176 ISBN 13: 9780201433173
Used Softcover

Seller: Ammareal, Morangis, France

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Softcover. Condition: Bon. Légères traces d'usure sur la couverture. Edition 2001. Ammareal reverse jusqu'à 15% du prix net de ce livre à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Slight signs of wear on the cover. Edition 2001. Ammareal gives back up to 15% of this book's net price to charity organizations. Seller Inventory # D-479-487

Contact seller

Buy Used

US$ 56.37
Convert currency
Shipping: US$ 8.93
From France to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

There are 1 more copies of this book

View all search results for this book