1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Resources pptx

4 318 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Nội dung

This is the Title of the Book, eMatter Edition Copyright © 2002 O’Reilly & Associates, Inc. All rights reserved. 161 Appendix E APPENDIX E Resources This appendix lists resources that you may find useful when securing your routers, systems, and networks. It also provides links to sites where you can find more detailed information on topics that are out of the scope of this book—including IPSec, RADIUS/TACACS+, and intrusion detection. Web Sites http://www.cisco.com This site provides the most current information on Cisco routers and products. Cisco’s online technical documentation is excellent and should usually be the first stop for questions involving Cisco routers. http://www.cisco.com/go/psirt A direct link to Cisco’s Product Security Incident Response Team (PSIRT) and a list of all Cisco IOS vulnerabilities. http://www.cisco.com/cgi-bin/Support/FeatureNav/FN.pl Cisco’s feature navigator. It helps determine what IOSversions and hardware support features such as IPSec and SSH. http://nsa1.www.conxion.com/cisco NSA-recommended guides for securing Cisco routers. http://nsa1.www.conxion.com Additional NSA-recommended security guides. http://www.securityfocus.com A security site with excellent news, articles, tools, and vulnerability listings. SecurityFocus is also home to the Bugtraq vulnerability forum. http://www.cert.org The original Computer Emergency Response Team (CERT) based out of Carn- egie Mellon. CERT is an excellent resource on vulnerabilities, fixes, and incident response. ,appe.22945 Page 161 Friday, February 15, 2002 2:52 PM This is the Title of the Book, eMatter Edition Copyright © 2002 O’Reilly & Associates, Inc. All rights reserved. 162 | Appendix E: Resources http://www.sans.org The System Administrator and Network Security web site. It is an excellent source for research and education in the area of information security. http://www.gocsi.com The Computer Security Institute web site. he source of the annual FBI/CSI com- puter crime and security survey. http://web.mit.edu/kerberos/www The MIT Kerberos web site. http://www.de.easynet.net/tacacs-faq The TACACS frequently asked questions web site (with a focus on Cisco). http://www.ietf.org/html.charters/OLD/radius-charter.html The IETF RADIUS workgroup with links to RFCs and RADIUS information. http://www.ietf.org/html.charters/ipsec-charter.html The IETF IPSec working group page with links to IPSec drafts and RFCs. http://www.rfc-editor.org A site where you can search RFCs by number, topic, and keyword. http://www.simpleweb.org A site with links to more information about SNMP. http://net-snmp.sourceforge.net A web site for the Net-SNMP open source SNMP server and client software. http://www.liquifried.com/docs/security/reservednets.html A large listing of IANA-reserved networks that can be included in antispoofing filters. http://www.ietf.org/html.charters/syslog-charter.html The IETF syslog working group with links to drafts and RFCs. http://www.isaca.org The Information Systems Audit and Control Association web site. This organiza- tion sponsors the Certified Information Systems Auditor (CISA) certification. Books Boney, James. Cisco IOS in a Nutshell. O’Reilly & Associates, 2001. This book consolidates the most important commands and features of IOSinto a single volume. Garfinkel, Simson and Gene Spafford. Practical Unix and Internet Security, Second Edition. O’Reilly & Associates, 1996. This classic reference is the definitive source of information on securing both standalone Unix systems and those connected to the Internet. ,appe.22945 Page 162 Friday, February 15, 2002 2:52 PM This is the Title of the Book, eMatter Edition Copyright © 2002 O’Reilly & Associates, Inc. All rights reserved. Books | 163 Kaeo, Merike. Designing Network Security. Cisco Press, 1999. Cisco’s book on the fundamentals of Cisco network security. Norberg, Stefan. Securing Windows NT/2000 Servers for the Internet. O’Reilly & Associates, 2000. This concise guide simplifies the job of securing a Windows server by paring down installation and configuration instructions into a series of checklists. Schneier, Bruce. Applied Cryptography. John Wiley & Sons, 1995. An excellent reference and introduction to cryptography and standard encryp- tion techniques and formulas. Sedayao, Jeff. Cisco IOS Access Lists. O’Reilly & Associates, 2001. This book focuses on a critical aspect of the Cisco IOS—access lists, which are central to securing routers and networks. van Wyk, Kenneth and Richard Forno. Incident Response. O’Reilly & Associates, 2001. This book combines technical information with guidelines for administrative planning so that organizations can map out their responses to computer incidents. Wenstrom, Michael. Managing Cisco Network Security. Cisco Press, 2001. Cisco’s overview of network security using Cisco products by Cisco Systems Zwicky, Elizabeth, Simon Cooper, and Brent Chapman. Building Internet Firewalls, Second Edition. O’Reilly & Associates, 2000. An excellent book on the complexities of designing and building firewalls. ,appe.22945 Page 163 Friday, February 15, 2002 2:52 PM ,appe.22945 Page 164 Friday, February 15, 2002 2:52 PM . Associates, Inc. All rights reserved. 161 Appendix E APPENDIX E Resources This appendix lists resources that you may find useful when securing your routers,. 2002 O’Reilly & Associates, Inc. All rights reserved. 162 | Appendix E: Resources http://www.sans.org The System Administrator and Network Security

Ngày đăng: 21/12/2013, 18:15

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN

w