Security Architecture: Design, Deployment, and Operations

  • Authors:
  • Christopher M. King;Curtis Dalton;Stephen H. Beck

  • Affiliations:
  • -;-;-

  • Venue:
  • Security Architecture: Design, Deployment, and Operations
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:New from the official RSA Press,this expert resource explains how to design and deploy security successfully across your enterprise—and keep unauthorized users out of your network. You'll get full coverage of VPNs and intrusion detection systems,plus real-world case studies. Apply the latest security technology to real-world corporate and external applications Design a secure solution from start to finish and learn the principles needed for developing solid network architecture using this authoritative guide. You'll find hands-on coverage for deploying a wide range of solutions,including network partitioning,platform hardening,application security and more. Get details on common security practices,standards,and guidelines and learn proven implementation techniques from case studies discussed in each chapter. Written by recognized experts and endorsed by RSA Security Inc.,the most trusted name in e-security,this comprehensive and practical security guide is your essential tool for planning and implementing a safe and reliable enterprise network. This book will show you how to: Develop an information classification and access control planUse the appropriate security policies and technology to best meet your security requirementsComprehend security infrastructure design principlesUtilize appropriate security technology in the most secure methodFully understand the tradeoffs between usability and liabilityEnsure complete network security across multiple systems,applications,hosts,and devicesDevelop and apply policies,assess risks,and understand requirements for running security-specific technologyWork with and configureIDS,VPN,PKI,and firewalls