Guide to Securing Intranet and Extranet Servers
Publisher: VeriSign 2000
Number of pages: 39
As Intranets and Extranets have become more widely deployed, new security challenges have emerged. This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use. The guide also describes how an intelligently deployed Public Key Infrastructure (PKI) system, based on digital certificate technology, addresses these security goals.
Download or read it online for free here:
by Microsoft Corporation - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
by Marcus Goncalves - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
by A. Orebaugh, S. Biles, J. Babbin - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.