This text covers the following areas: design techniques with larges scale deployment in enterprise networks (e.g. mixed VPN and Firewalls, access control, integration of PKI and Biometrics via LDAP etc); real-time event management systems (such as eSecurity, Unicenter, Micromuse) and enterprise firewall managers (e.g. Check Point Provider-1); security policy deployment and management (including automated techniques as provided by new vendors such as Solsoft); intrusion detection systems (ISS, Snort, intrusion.com, CA, Tripwire etc), IDS architectures, use of AI and other techniques in intrusion detection (i.e. latest research). Intrusion avoidance; operating systems and applications hardening stratgies; response to security attacks (process, procedures, techniques); use of honeypots and burglar alarms; Legal issues; disaster recover - strategies and planning; more detailed analysis on specific attacks (including protocols traces and explanations); and management strategies - in-house or outsourcing pros and cons.
Publisher: Elsevier Science & Technology