1 - 20
Next
- Oki, Eiji, 1969-
- Hoboken, New Jersey : John Wiley & Sons, Inc., 2012.
- Description
- Book — 1 online resource
- Summary
-
- Preface xi Acknowledgments xv About the Authors xvii
- 1 Transmission Control Protocol/Internet Protocol Overview 1 1.1 Fundamental Architecture / 1 1.2 Internet Protocol Basics / 4 1.3 Routing / 13
- 2 Transport-Layer Protocols 19 2.1 Transmission Control Protocol / 19 2.2 User Datagram Protocol / 25 2.3 Stream Control Transmission Protocol / 26 2.4 Real-Time Transport Protocol / 29
- 3 Internet Architecture 31 3.1 Internet Exchange Point / 31 3.2 History of Internet Exchange Points / 33 3.3 Internet Service Provider Interconnection Relationships / 34 3.4 Peering and Transit / 35
- 4 IP Routing Protocols 39 4.1 Overview of Routing Protocols / 40 4.2 Routing Information Protocol / 43 4.3 Open Shortest Path First / 48 4.4 Border Gateway Protocol / 53
- 5 Multiprotocol Label Switching 59 5.1 Overview / 59 5.2 Functions and Mechanisms / 63 5.3 Applicabilities / 67
- 6 IP Quality Of Service 75 6.1 Introduction / 75 6.2 Quality of Service in IP Version 4 / 75 6.3 Integrated Services / 77 6.4 Differentiated Services / 81 6.5 Quality Of Service with Nested Differentiated Services Levels / 82
- 7 IP Multicast and Anycast 93 7.1 Addressing / 93 7.2 Multicast Routing / 96 7.3 Routing Protocols / 97 7.4 Anycasting / 102 7.5 IPv6 Anycast Routing Protocol: Protocol-Independent Anycast-Sparse Mode / 105
- 8 Layer-2 Transport over Packet 109 8.1 Draft-Martini Signaling and Encapsulation / 109 8.2 Layer-2 Tunneling Protocol / 114
- 9 Virtual Private Wired Service 123 9.1 Types of Private Wire Services / 123 9.2 Generic Routing Encapsulation / 130 9.3 Layer-2 Tunneling Protocol / 131 9.4 Layer-3 Virtual Private Network 2547bis, Virtual Router / 131
- 10 IP and Optical Networking 137 10.1 IP/Optical Network Evolution / 138 10.2 Challenges in Legacy Traditional IP/Optical Networks / 140 10.3 Automated Provisioning in IP/Optical Networks / 142 10.4 Control Plane Models for IP/Optical Networking / 144 10.5 Next-Generation MultiLayer Network Design Requirements / 147 10.6 Benefits and Challenges in IP/Optical Networking / 148
- 11 IP Version 6 151 11.1 Addresses in IP Version 6 / 152 11.2 IP Packet Headers / 154 11.3 IP Address Resolution / 155 11.4 IP Version 6 Deployment: Drivers and Impediments / 156
- 12 IP Traffic Engineering 163 12.1 Models of Traffic Demands / 163 12.2 Optimal Routing with Multiprotocol Label Switching / 165 12.3 Link-Weight Optimization with Open Shortest Path First / 169 12.4 Extended Shortest-Path-Based Routing Schemes / 173
- 13 IP Network Security 181 13.1 Introduction / 181 13.2 Detection of Denial-of-Service Attack / 182 13.3 IP Traceback / 187 13.4 Edge Sampling Scheme / 189 13.5 Advanced Marking Scheme / 193
- 14 Mobility Support for IP 197 14.1 Mobility Management Approaches / 199 14.2 Security Threats Related to IP Mobility / 205 14.3 Mobility Support in IPv6 / 213 14.4 Reactive Versus Proactive Mobility Support / 218 14.5 Relation to Multihoming / 219 14.6 Protocols Supplementing Mobility / 220 References / 231 Index 235.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Le, Dac-Nhuong, 1983- author.
- Hoboken : Wiley-Scrivener, 2019.
- Description
- Book — 1 online resource
- Summary
-
The purpose of this book is first to study MATLAB programming concepts, then the basic concepts of modeling and simulation analysis, particularly focus on digital communication simulation. The book will cover the topics practically to describe network routing simulation using MATLAB tool. It will cover the dimensions' like Wireless network and WSN simulation using MATLAB, then depict the modeling and simulation of vehicles power network in detail along with considering different case studies. Key features of the book include: Discusses different basics and advanced methodology with their fundamental concepts of exploration and exploitation in NETWORK SIMULATION. Elaborates practice questions and simulations in MATLAB Student-friendly and Concise Useful for UG and PG level research scholar Aimed at Practical approach for network simulation with more programs with step by step comments. Based on the Latest technologies, coverage of wireless simulation and WSN concepts and implementations.
(source: Nielsen Book Data)
- Exposito Garcia, Ernesto José.
- London : ISTE Ltd. ; Hoboken : John Wiley, 2013.
- Description
- Book — 1 online resource.
- Summary
-
- Preface xi
- Chapter 1. Introduction 1 1.1. Evolution of application and network layers 1 1.2. Summary of contributions 3 1.3. Book structure 5
- Chapter 2. Transport Protocols State of the Art 7 2.1. Introduction7 2.2. Transport layer reference models 9 2.2.1. OSI model 9 2.2.2. TCP/IP model 9 2.2.3. Transport layer 9 2.2.4. Transport services 10 2.3. Transport functions and mechanisms 11 2.3.1. Error control 11 2.3.2. Congestion control 14 2.3.3. Summary 19 2.4. IETF transport protocols 20 2.4.1. TCP 20 2.4.2. UDP21 2.4.3. SCTP 21 2.4.4. DCCP 22 2.4.5. MPTCP 23 2.5. Summary 23
- Chapter 3. Semantic Modeling of Transport Protocols and Services 25 3.1. Introduction 25 3.2. Model and semantic-driven architecture 26 3.2.1. Model-driven architecture 26 3.2.2. Ontology-driven architecture 27 3.3. Design of a QoS ontology framework 28 3.3.1. Quality of Service definition 28 3.3.2. ITU-T X.641 framework 29 3.3.3. Service 29 3.3.4. Service user . 29 3.3.5. Service provider30 3.3.6. QoS characteristic 30 3.3.7. QoS requirement . 30 3.3.8. QoS parameter 30 3.3.9. QoS function. 31 3.3.10. QoS mechanism . 31 3.4. Design of a QoS transport ontology for the next generation transport layer . 31 3.4.1. Ontology representation 31 3.4.2. X.641 QoS ontology . 32 3.4.3. QoS transport requirements 33 3.4.4. QoS transport mechanisms, functions and protocols . 33 3.5. QoS transport ontology specification. 34 3.5.1. TCP semantic description . 34 3.5.2. UDP semantic description. 36 3.5.3. SCTP semantic description 36 3.5.4. DCCP semantic description 38 3.5.5. MPTCP semantic description . 40 3.6. Usage of the QoS transport ontology specification 41 3.6.1. QoS transport services characterization 42 3.6.2. Transport components and transport composite characterization 45 3.7. Summary 46
- Chapter 4. Model-Driven Design Methodology of Transport Mechanisms and Functions 49 4.1. Introduction49 4.2. Software engineering process 50 4.2.1. Unified Modeling Language 51 4.2.2. UML 2.4.1-based methodology 52 4.2.3. UML diagrams 55 4.2.4. Summary and additional resources 66 4.3. Applying the UML-based software engineering methodology for transport services 68 4.3.1. Contextual model of transport functions and mechanisms 68 4.3.2. Analysis of requirements guiding transport functions 69 4.3.4. Design of transport functions and mechanisms 71 4.4. Summary 77
- Chapter 5. Model-Driven Specification and Validation of Error Control Transport Mechanisms and Functions 79 5.1. Introduction 79 5.2. Design of an error control function 80 5.2.1. Behavior specification of the sending side protocol entity 81 5.2.2. Behavior specification of the receiving side protocol entity 83 5.3. Functional validation of the error control function 84 5.3.1. Functional validation using a perfect medium 86 5.3.2. Functional validation using an imperfect medium 88 5.4. A new design of the error control function 93 5.4.1. Functional validation using an imperfect medium 96 5.4.2. More open questions 97 5.5. A model-driven simulation environment 98 5.5.1. Model-driven simulation framework 99 5.5.2. Model-driven network simulator package 100 5.5.3. Lossy medium simulator 101 5.5.4. Delayed medium simulator 102 5.5.5. Bandwidth-limited medium simulator 104 5.6. Chapter summary 106 5.7.
- Appendix 107
- Chapter 6. Model-Driven Specification and Validation of Congestion Control Transport Mechanisms and Functions 109 6.1. Introduction 109 6.2. Design of a congestion control function 110 6.2.1. Behavior specification of the sending and receiving side protocol entities 111 6.2.2. The TCP-friendly rate control (TFRC) specification 114 6.2.3. Detailed TFRC design 117 6.3. Functional validation of the congestion control function 119 6.3.1. Case study 1: continuous stream of messages (no time constraints) 121 6.3.2. Case study 2: GSM audio stream 123 6.3.3. Case study 3: MJPEG video stream 123 6.4. Summary 126 6.5.
- Appendix 127
- Chapter 7. Specification and Validation of QoS-Oriented Transport Mechanisms and Functions 129 7.1. Introduction 129 7.2. Contextual model of a QoS-oriented transport functions 130 7.3. Contextual model of a QoS-oriented error control functions 131 7.3.1. Partially ordered/partially reliable transport services 133 7.4. Contextual model of a QoS-oriented congestion control functions 138 7.4.1. QoS-aware TFRC congestion control 139 7.5. Design of the QoS-oriented error control functions 142 7.5.1. Basis of a fully reliable SACK-based function143 7.5.2. Design of a partially reliable SACK-based function 144 7.5.3. Design of a partially reliable function 146 7.5.4. Design of a differentiated and partially reliable function 147 7.5.5. Design of a time-constrained, differentiated and partially reliable function 148 7.6. Design of the QoS-oriented congestion control function 148 7.6.1. Basis of a TCP-friendly rate control function 149 7.6.2. Design of a time-constrained and differentiated congestion control function 151 7.7. Summary 153
- Chapter 8. Architectural Frameworks for a QoS-Oriented Transport Protocol 157 8.1. Introduction 157 8.2. Communication architecture requirements 159 8.3. Architectural frameworks for communication protocols 160 8.3.1. QoS-oriented architecture 160 8.3.2. Architectural frameworks for communication protocols 161 8.4. Design of a composite and QoS-oriented transport protocol 164 8.4.1. Design of the fully programmable transport protocol 164 8.5. Evaluation of the FPTP transport protocol 180 8.5.1. FPTP TD-TFRC mechanism 180 8.5.2. FPTP D-PR and TD-PR mechanisms 181 8.5.3. FPTP TD-TFRC mechanisms 182 8.5.4. Analysis of results 183 8.6. Summary 184 8.7.
- Appendix 184
- Chapter 9. Service-Oriented and Component-Based Transport Protocol 187 9.1. Introduction187 9.2. State-of-the-art on modern software architectural frameworks 188 9.2.1. Service-oriented architecture 188 9.2.2. Component-based design 190 9.2.3. Summary 192 9.3. Design guidelines of a component-based and service-oriented architecture for the next generation transport layer 193 9.3.1. Service-oriented architecture transport layer (SOATL) 193 9.3.2. Service-component architecture for transport protocols (SCATP) 193 9.3.3. Semantic model guiding the selection and composition of transport services 194 9.4. FPTP semantic description 194 9.4.1. FPTP individual 195 9.4.2. Service characterization inferences based on components axioms 196 9.5. Summary 198 9.6.
- Appendix 199
- Chapter 10. Adaptive Transport Protocol 201 10.1. Introduction 201 10.2. The enhanced transport protocol 202 10.2.1. Adaptive composite communication architecture 203 10.2.2. Behavioral adaptation 205 10.2.3. Structural adaptation 209 10.3. Summary 212
- Chapter 11. Autonomic Transport Protocol 213 11.1. Introduction 213 11.2. Autonomic computing 214 11.3. Self-managing functions 215 11.4. Architecture 215 11.4.1. Autonomic elements 216 11.4.2. Autonomic orchestrators 218 11.4.3. Policies 219 11.4.4. Knowledge base 220 11.4.5. Summary 220 11.5. Design guidelines of an autonomic computing architecture for the next-generation transport layer 221 11.5.1. Self-managing functionalities 221 11.5.2. Architecture 222 11.5.3. Autonomic orchestrators 224 11.5.4. Policy framework 228 11.5.5. Knowledge base 228 11.6. Summary 228 11.7.
- Appendix 229 Conclusions 231 Perspectives 235
- Appendix 239 Bibliography 269 Index 279.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Crespi, Noel.
- London : Iste ; Hoboken, NJ : Wiley, 2013.
- Description
- Book — 1 online resource (xiii, 272 p.) : ill.
- Summary
-
- Foreword ix Introduction xi Acknowledgements xv
- Chapter 1. Describing Service Architectures 1 1.1. The telecommunications community 2 1.1.1. The service and global functional planes of the intelligent network 2 1.1.2. From TINA to the NGN 8 1.1.3. The OMA and the concept of the enabler 11 1.2. The Web community 16 1.2.1. Web services as fundamental structural units 16 1.2.2. Semantic description of resources 18 1.2.3. Semantic description of Web services 19 1.3. The IT community 23 1.3.1. Service-oriented architectures 23 1.3.2. The concept of view 26 1.3.3. Enterprise architecture and urbanization 28 1.4. Summary 33
- Chapter 2. Convergence of Service 35 2.1. Overview of communication services 35 2.1.1. Telecoms services and the NGN 35 2.1.2. The NGN 36 2.1.3. Towards convergence 47 2.1.4. Implementation of convergent services 50 2.2. Common developments of the service sector 52 2.2.1. The service production viewpoint: from need to service 54 2.2.2. The service use viewpoint: customer, consumer and user 58 2.2.3. From service to service system 61 2.3. Application to telecoms services 63 2.3.1. Telecoms services from the point of view of production? 63 2.3.2. Telecoms services from the point of view of use? 66 2.3.3. How to structure telecoms services? 68 2.4. Summary 74
- Chapter 3. Building an Architectural Framework for Telecom Services 77 3.1. A business reference view for telecom services 78 3.1.1. Activities from the business view 78 3.1.2. Service processes 84 3.1.3. Application to telecom services 90 3.2. A functional reference view for telecom services 91 3.2.1. Components of the functional view 91 3.2.2. Functional patterns 94 3.2.3. Application to telecom services 96 3.3. A technical reference view for telecom services 99 3.3.1. The elements of the technical view 99 3.3.2. Technical roles and reference points 102 3.4. Summary 104
- Chapter 4. Modeling and Case Study 107 4.1. The business reference view 108 4.1.1. Modeling 108 4.1.2. Illustrations 109 4.2. Functional reference view 116 4.2.1. Modeling 116 4.2.2. Illustration 128 4.3. The technical reference view 142 4.3.1. Modeling 142 4.3.2. Illustration 144 4.4. Functional view of a service 157 4.4.1. Modeling 158 4.4.2. Illustration 164 4.5. The technical view of a service 175 4.5.1. Modeling 176 4.5.2. Illustration 179 4.6. The applicative view of a service 185 4.6.1. Modeling 187 4.6.2. Illustration 194 4.7. Summary 208
- Chapter 5. Organizational and Software Applications 211 5.1. An aid for the construction of service offers 211 5.1.1. Service design 211 5.1.2. Evaluation and comparison of services 212 5.1.3. Service management 216 5.2. An aid for the rationalization of services 218 5.2.1. The case of enablers 218 5.2.2. The case of software service 220 5.2.3. The case of semantic services 222 5.3. An aid for achieving service convergence 223 5.3.1. A technical pattern for the Web/IMS convergence 224 5.3.2. Unified access to services 228 5.3.3. Inter-service communication 233 5.4. Summary 238 Conclusion 239
- Appendix 245 Bibliography 249 List of Figures and Tables 263 Index 269.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Fadyushin, Vyacheslav, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations.
- Summary
-
- Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface;
- Chapter 1: Understanding Wireless Network Security and Risks ; Understanding wireless environment and threats; An overview of wireless technologies; An overview of wireless threats; Wi-Fi media specifics; Common WLAN protection mechanisms and their flaws; Hiding SSID; MAC filtering; WEP; WPA/WPA2; Pre-shared key mode; Enterprise mode; WPS; Getting familiar with the Wi-Fi attack workflow; General Wi-Fi attack methodology; The active attacking phase; WPA-PSK attacks
- Enterprise WLAN attacksSummary;
- Chapter 2: Planning Your Lab Environment ; Understanding what tasks your lab should fulfill; Objectives of a lab; Lab tasks; Network reconnaissance; Web application hacking; Hacking and researching network services; AD hacking; DBMS hacking; Network layer attacks; Wi-Fi penetration testing; Planning the network topology; Choosing appropriate components; Network devices; Server and workstation components; Planning lab security; Access control; Integrated security mechanisms; Security solutions; Security hints; Summary
- Chapter
- 3: Configuring Networking Lab Components General lab network communication rules; Configuring hardware wired devices; Preparing the console connection on Windows; Core switch; Initial configuration; Configuring interfaces and VLANs; Hardening the core switch; Configuring subinterfaces and subnets; Configuring auxiliary services; Basic gateway hardening; Configuring virtual wired network devices; Network virtualization platform; Software installation; Initial configuration; Network topology implementation; Switch; Gateway; Virtual host emulation; Wireless hardware devices
- Configuring WLANsGuest WLAN; Preparing the hardware access point; Summary;
- Chapter 4: Designing Application Lab Components ; Planning services; Creating virtual servers and workstations; VirtualBox overview and installation; Creating virtual machines; Configuring network settings of lab components; Installing and configuring domain services; Creating a domain; Creating users; Adding hosts to the domain; Certification authority services; Creating a root certificate; Creating a working certificate; Installing a root certificate; Installing a remote management service; Corporative e-mail service
- Configuring a DNS serverInstalling and configuring hMailServer; Installing vulnerable services; Installing web applications; Preparing a web server; WebGoat; DVWA; Liferay Portal; Metasploitable; Vulnerable VoIP server; Summary;
- Chapter 5: Implementing Security ; Network-based security solutions; Configuring network access control; Isolating external and guest networks; Isolating internal VLANs; Securing wireless access; Preparing the RADIUS server; Preparing the certificates; Configuring RADIUS; Configuring the access point; Configuring the WLAN client
(source: Nielsen Book Data)
- Wang, Jie, 1961-
- Second edition. - Hoboken, NJ : Wiley ; Singapore : HEP, 2015.
- Description
- Book — 1 online resource.
- Summary
-
- Front Matter
- Network Security Overview
- Data Encryption Algorithms
- Public-Key Cryptography and Key Management
- Data Authentication
- Network Security Protocols in Practice
- Wireless Network Security
- Cloud Security
- Network Perimeter Security
- Intrusion Detections
- The Art of Anti-Malicious Software
- 7-bit ASCII code
- SHA-512 Constants (in Hexadecimal)
- Data Compression Using ZIP
- Base64 Encoding
- Cracking WEP Keys Using WEPCrack
- Acronyms
- Further Readings
- Index
(source: Nielsen Book Data)
- Egerton, Peter, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations.
- Summary
-
- Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface;
- Chapter 1: The Configuration Manager Troubleshooting Toolkit; Microsoft System Center Configuration Manager Toolkit; Server tools; Client tools; Microsoft System Center 2012 Configuration Manager Support Center; WMI tools; Registry Editor; Group Policy tools; Log file viewer; Error code lists; PowerShell; Network tools; System Center Configuration Manager Management Pack; Community contributions; Summary;
- Chapter 2 : Configuration Manager Monitoring Workspace and Log Files
- The Monitoring workspaceAlerts; System status; Log files; Client log files; Server log files; Summary;
- Chapter 3 : Troubleshooting Configuration Manager Clients; Client installation; The Configuration Manager client; Hidden files; Trigger client actions; Apple Mac OSX client; Unix and Linux clients; Client log files; Application management; Package delivery; Software Center; General client activity; Extended logging; Common problems; External factors; Windows Management Instrumentation; Background Intelligent Transfer Service; Certificates; Summary
- Chapter 4 : Troubleshooting Hierarchies and Site ServersHierarchies and Site Servers; Replication; Log files; SQL Server; SQL performance; SQL logs; SQL trace and extended events; The Configuration Manager console; Troubleshooting the console; Debug modes; Active Directory; Schema Extension; Attributes; Classes; DNS and DHCP; Certificate services; Discovery; Site boundaries; Summary;
- Chapter 5 : Troubleshooting Management Points and Distribution Points; How a management point works; Testing our management point; Troubleshooting our management point; Console; HTTP codes; Log files
- Management point common issuesInstallation; Prerequisites; Ports and firewalls; Certificates; How a distribution point works; Pull distribution points; Cloud distribution points; Preboot Execution Environment; Troubleshooting our distribution point; Console; Content Status; Distribution Point Group Status; Distribution Point Configuration Status; Logs; WMI; PXE; Distribution point common issues; Distribution; Boundary assignment; Content mismatch; BranchCache; Prestaged content; PXE boot failure; Summary;
- Chapter 6 : Troubleshooting Other Roles; Application Catalog roles
- Application Catalog website pointTroubleshooting in the console; Troubleshooting in the log files; Application Catalog web service point; Troubleshooting in the console; Troubleshooting in the log files; Asset Intelligence synchronization point; Troubleshooting in the console; Troubleshooting in the log files; Certificate registration point; Troubleshooting in the console; Troubleshooting in the log files; Endpoint Protection point; Troubleshooting in the console; Troubleshooting in the log files; Antimalware policies; Enrollment and Enrollment proxy point; Troubleshooting in the console
(source: Nielsen Book Data)
- Duggan, Dominic.
- Hoboken : Wiley, c2012.
- Description
- Book — 1 online resource (xxii, 482 p.)
- Summary
-
- List of Figures xv Acknowledgements xxiii
- 1. Introduction 1 References / 6
- 2. Middleware 7 2.1 Enterprise Information Systems / 7 2.2 Communication / 12 2.3 System and Failure Models / 21 2.4 Remote Procedure Call / 34 2.5 Message-Oriented Middleware / 42 2.6 Web Services and Service-Oriented Architecture (SOA) / 46 2.7 Cloud Computing / 52 2.8 Naming and Discovery / 55 2.9 Further Reading / 56 References / 57
- 3. Data Modeling 59 3.1 Entities and Relationships / 60 3.1.1 Concepts and Entities / 60 3.1.2 Attributes and Relationships / 61 3.1.3 Properties of Relationship Types / 65 3.1.4 Special Relationship Types / 69 3.2 XML Schemas / 74 3.3 Defining New Types / 79 3.3.1 Defining Simple Types / 79 3.3.2 Defining Complex Types / 82 3.4 Derived Types / 85 3.4.1 Derived Simple Types / 86 3.4.2 Derived Complex Types / 87 3.5 Document Hierarchies / 94 3.6 Relationship Types in XML Schemas / 98 3.7 Metaschemas and Metamodels / 100 3.8 Further Reading / 102 References / 102
- 4. Data Processing 104 4.1 Processing XML Data / 104 4.1.1 Tree Processing / 105 4.1.2 Schema Binding / 109 4.1.3 Stream Processing / 114 4.1.4 External Processing / 119 4.2 Query Languages and XQuery / 122 4.3 XML Databases / 134 4.3.1 Storage as Relational Tables / 135 4.3.2 Storage as Large Strings / 137 4.3.3 Native XML Storage / 137 4.4 Web Services / 138 4.4.1 SOAP: (not so) Simple Object Access Protocol / 139 4.4.2 WSDL: Web Services Description Language / 145 4.4.3 Web Service Policy / 155 4.5 Presentation Layer: JSON and JQUERY / 159 References / 166
- 5. Domain-Driven Architecture 167 5.1 Software Architecture / 167 5.2 Domain-Driven Design / 168 5.3 Application Frameworks / 175 5.4 Domain-Specific Languages (DSLs) / 180 5.5 An Example API for Persistent Domain Objects / 188 5.6 Domain-Driven Architecture / 197 5.7 Further Reading / 205 References / 205
- 6. Service-Oriented Architecture 207 6.1 Services and Procedures / 207 6.2 Service-Oriented Architecture (SOA) / 211 6.3 Service Design Principles / 216 6.4 Service-Oriented Architecture (SOA) Governance / 218 6.5 Standardized Service Contract / 221 6.5.1 Operations Contract / 222 6.5.2 Data Contract / 223 6.5.3 Policy Contract / 224 6.5.4 Binding Contract / 226 6.5.5 Contract Versioning / 231 6.6 Service Loose Coupling / 237 6.6.1 Motivation for Loose Coupling / 237 6.6.2 Contract Development / 239 6.6.3 Loose Coupling Patterns / 242 6.6.4 Cost of Loose Coupling / 246 6.7 Service Abstraction / 248 6.7.1 Platform Abstraction / 248 6.7.2 Protocol Abstraction / 249 6.7.3 Procedural Abstraction / 261 6.7.4 State Abstraction / 264 6.7.5 Data Abstraction / 269 6.7.6 Endpoint Abstraction / 278 6.8 Service Reusability / 278 6.8.1 Parameterization and Bounded Polymorphism / 279 6.8.2 Subtyping, Inheritance, and Contracts / 284 6.8.3 Does Service-Oriented Architecture Require Subtyping? / 289 6.8.4 Patterns for Service Reusability / 292 6.9 Service Autonomy / 299 6.9.1 Replicating Computation / 300 6.9.2 Replicating State / 303 6.9.3 Sources of Errors and Rejuvenation / 308 6.9.4 Caching / 313 6.10 Service Statelessness / 323 6.10.1 Contexts and Dependency Injection / 331 6.11 Service Discoverability / 336 6.11.1 Global Discovery / 336 6.11.2 Local Discovery / 337 6.11.3 Layered Naming / 347 6.12 Further Patterns / 351 6.13 Further Reading / 352 References / 352
- 7. Resource-Oriented Architecture 359 7.1 Representational State Transfer / 359 7.2 RESTful Web Services / 369 7.3 Resource-Oriented Architecture (ROA) / 379 7.4 Interface Description Languages / 387 7.4.1 Web Services Description Language (WSDL) / 387 7.4.2 Web Application Description Language (WADL) / 390 7.5 An Example Application Program Interface (API) for Resource-Oriented Web Services / 396 7.6 Hypermedia Control and Contract Conformance / 406 7.7 Concluding Remarks / 412 7.8 Further Reading / 414 References / 414 Appendix A: Introduction to Haskell 416 A.1 Types and Functions / 416 A.2 Type Classes and Functors / 425 A.3 Monads / 431 A.4 Further Reading / 436 References / 436 Appendix B: Time in Distributed Systems 437 B.1 What Time Is It? / 437 B.2 Time and Causality / 443 B.3 Applications of Logical and Vector Time / 450 B.3.1 Mutual Exclusion / 450 B.3.2 Quorum Consensus / 451 B.3.3 Distributed Logging / 456 B.3.4 Causal Message Delivery / 458 B.3.5 Distributed Snapshots / 463 B.4 Virtual Time / 468 B.5 Further Reading / 470 References / 470 Index 473.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
9. Network Security [electronic resource] [2014]
- Perez, Andre.
- London : ISTE ; Hoboken, NJ : Wiley, 2014.
- Description
- Book — 1 online resource
- Summary
-
- PREFACE xi ABBREVIATIONS xxxiii
- CHAPTER 1. INTRODUCTION TO CRYPTOGRAPHY 1
- 1.1. The encryption function 1
- 1.1.1. 3DES algorithm 3
- 1.1.2. AES algorithm 6
- 1.1.3. RSA algorithm 10
- 1.1.4. ECC algorithm 12
- 1.2. Hash function 13
- 1.2.1. MD5 algorithm 13
- 1.2.2. SHA algorithm 16
- 1.2.3. HMAC mechanism 20
- 1.3. Key exchange 22
- 1.3.1. Secret-key generation 22
- 1.3.2. Public key distribution 24
- CHAPTER 2. 802.1X MECHANISM 27
- 2.1. General introduction 27
- 2.2. EAPOL protocol 28
- 2.2.1. EAPOL-Start message 30
- 2.2.2. EAPOL-Logoff message 30
- 2.2.3. EAPOL-Key message 30
- 2.2.4. EAPOL-Encapsulated-ASF-Alert message 31
- 2.2.5. EAPOL-MKA message 31
- 2.2.6. EAPOL-Announcement message 31
- 2.2.7. EAPOL-Announcement-Req message 32
- 2.3. EAP protocol 32
- 2.3.1. EAP-Method Identity 35
- 2.3.2. EAP-Method Notification 35
- 2.3.3. EAP-Method NAK 36
- 2.4. RADIUS protocol 36
- 2.4.1. RADIUS messages 38
- 2.4.2. RADIUS attributes 39
- 2.5. Authentication procedures 42
- 2.5.1. EAP-MD5 procedure 44
- 2.5.2. EAP-TLS procedure 45
- 2.5.3. EAP-TTLS procedure 48
- CHAPTER 3. WPA MECHANISMS 51
- 3.1. Introduction to Wi-Fi technology 51
- 3.2. Security mechanisms 54
- 3.3. Security policies 55
- 3.4. Key management 59
- 3.4.1. Key hierarchy 59
- 3.4.2. EAPOL-key messages 61
- 3.4.3. Four-way handshake procedure 63
- 3.4.4. Group key handshake procedure 67
- 3.5. WEP protocol 68
- 3.6. TKIP protocol 70
- 3.7. CCMP protocol 73
- CHAPTER 4. IPSEC MECHANISM 77
- 4.1. Review of IP protocols 77
- 4.1.1. IPv4 protocol 77
- 4.1.2. IPv6 protocol 80
- 4.2. IPSec architecture 83
- 4.2.1. Security headers 85
- 4.2.2. Security association 89
- 4.2.3. PMTU processing 92
- 4.3. IKEv2 protocol 93
- 4.3.1. Message header 93
- 4.3.2. Blocks 96
- 4.3.3. Procedure 102
- CHAPTER 5. SSL, TLS AND DTLS PROTOCOLS 109
- 5.1. Introduction 109
- 5.2. SSL/TLS protocols 111
- 5.2.1. Record header 111
- 5.2.2. Change-cipher-spec message 112
- 5.2.3. Alert message 112
- 5.2.4. Handshake messages 114
- 5.2.5. Cryptographic information 124
- 5.3. DTLS protocol 126
- 5.3.1. Adaptation to UDP transport 126
- 5.3.2. Adaptation to DCCP transport 129
- 5.3.3. Adaption to SCTP transport 130
- 5.3.4. Adaption to SRTP transport 131
- CHAPTER 6. NETWORK MANAGEMENT 133
- 6.1. SNMPv3 management 133
- 6.1.1. Introduction 133
- 6.1.2. SNMPv3 architecture 135
- 6.1.3. SNMPv3 message structure 143
- 6.2. SSH protocol 146
- 6.2.1. SSH-TRANS protocol 146
- 6.2.2. SSH-USERAUTH protocol 151
- 6.2.3. SSH-CONNECT protocol 152
- CHAPTER 7. MPLS TECHNOLOGY 155
- 7.1. MPLS overview 155
- 7.1.1. Network architecture 155
- 7.1.2. LSR router tables 157
- 7.1.3. PHP function 158
- 7.1.4. MPLS header format 159
- 7.1.5. DiffServ support 160
- 7.2. LDP protocol 162
- 7.2.1. Principles of functioning 162
- 7.2.2. LDP PDU format 165
- 7.2.3. LDP messages 167
- 7.3. VPN construction 170
- 7.3.1. Network architecture 170
- 7.3.2. Differentiation of routes 174
- 7.3.3. Route target 175
- 7.3.4. Principles of operation 177
- 7.4. Network interconnection 180
- 7.4.1. Hierarchical mode 181
- 7.4.2. Recursive mode 182
- CHAPTER 8. ETHERNET VPN 185
- 8.1. Ethernet technology 185
- 8.1.1. Physical layer 186
- 8.1.2. MAC layer 188
- 8.1.3. VLAN isolation 191
- 8.2. PBT technology 194
- 8.3. VPLS technology 196
- 8.3.1. Network architecture 196
- 8.3.2. EoMPLS header 199
- 8.3.3. LDP 201
- 8.4. L2TPv3 technology 203
- 8.4.1. Data message 203
- 8.4.2. Control messages 205
- 8.4.3. Procedures 208
- CHAPTER 9. FIREWALLS 215
- 9.1. Technologies 215
- 9.1.1. Packet filter 216
- 9.1.2. Applicative gateway 218
- 9.1.3. NAT/NAPT device 219
- 9.2. NAT/NAPT device crossing 222
- 9.2.1. ICMP protocol 223
- 9.2.2. IPSec mechanism 224
- 9.2.3. SIP, SDP and RTP protocols 227
- 9.2.4. FTP protocol 233
- 9.2.5. Fragmentation 235
- CHAPTER 10. INTRUSION DETECTION 237
- 10.1. Typology of attacks 237
- 10.2. Methods of detection 239
- 10.2.1. Signature-based detection 240
- 10.2.2. Anomaly-based detection 240
- 10.2.3. Protocol analysis 241
- 10.3. Technologies 242
- 10.3.1. N-IDPS device 243
- 10.3.2. WIDPS device 246
- 10.3.3. H-IDPS device 248
- 10.3.4. NBA device 249
- BIBLIOGRAPHY 253
- INDEX 259.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Marinescu, Dan C.
- 1st ed. - Boston : Morgan Kaufmann, 2013.
- Description
- Book — 1 online resource.
- Summary
-
- 1: Introduction to Cloud Computing
- 2: Network-centric computing and network-centric content
- 3: Basic Concepts
- 4: Cloud Infrastructure
- 5: Cloud Computing
- 6: Virtualization
- 7. Resource Management
- 8: Networking support for cloud computing
- 9: Cloud Security
- 10: Complex Systems and Self-Organization
- 11: Cloud Application Development.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Marks, Kristin.
- [Place of publication not identified], AUERBACH PUBLICATIONS, 2017.
- Description
- Book — 1 online resource
- Summary
-
- 1. Defining the Question
- 2. Overview of Servers and Functions
- 3. Hardware
- 4. Network Operating Systems
- 5. Application Servers
- 6. Server Management Add-Ons.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Jarpey, Gregory, author.
- Kidlington, Oxford, United Kingdom : Butterworth-Heinemann is an imprint of Elsevier, 2017.
- Description
- Book — 1 online resource.
- Summary
-
- Front Cover; Security Operations Center Guidebook; Copyright Page; Dedication; Contents; Introduction; A Rocky Start; I. Developing Your Security Operations Center; 1 What is a Security Operations Center?; Third Party; Hybrid; Dedicated; Historical Lessons; 2 Needs Assessment; Risk Assessment; Types of Companies; A Single Suite in a Larger Office Complex That Operates Primarily During Business Hours; A Single Location Dedicated to Only Your Company, with no Other Tenants; A Single Campus with Multiple Buildings; Multiple Locations Located in the Same Metro Area
- Multiple Locations Spread across a Single Country and Multiple Locations Spread across Several CountriesAdditional Considerations; Historical Lessons; Vulnerable Adults; Modest Beginnings; 3 Business Case; Example; Historical Lessons; First Attempt; A Unique Approach; 4 Building Your SOC; Workstations; Historical Lessons; 5 Staffing Options; Training; Career Progression; Retention; Historical Lessons; II. Operations; 6 Responsibilities and Duties; Introduction; Welcome to the SOC-You Have an Important Role; Mission Statement; SCO Job Description; Sample SCO Job Description; Position Summary
- Duties and ResponsibilitiesQualifications; Physical Demands/Environmental Conditions; Hiring and Interviewing Your SCO Candidate; Sample Interview Questions for a SCO; Staffing and Schedule; Sample Three-Week Rotation; Supervisory Authority; Staff Responsibility; Historical Lessons; 7 Post Orders and Procedures; Introduction; Setting Up Your Post Orders; Create a Shared Email Address for Security Inquiries and Requests; Performance of Duties; Example Post Order Table of Contents Setup and Their Purpose; Chapter One-Introduction; Chapter Two-Duties; Chapter Three-Call Center Procedures
- Chapter Four-Emergency ProceduresChapter Five-Standards and Policies; Chapter Six-Equipment Procedures; Chapter Seven-Post Order Changes and Updates; Chapter Eight-Appendices; Site Procedures; Section One-Site Info; Section Two-Intrusion Alarm Response; Section Three-Fire Alarm Response; Section Four-Mechanical Alarms; Section Five-Contact Lists; Section Six-Special Instructions; Historical Lessons; 8 Training Programs; Introduction; Getting Started; New Hire Training Schedule; Individual Training Checklist; Monthly, Quarterly, and Annual Training; Historical Lessons
- 9 Enterprise Access ControlIntroduction; Setting Up Your Physical Access Control System; Operator Permissions; Card Access Programming and Control; Setting up and Controlling Your Restricted Areas Access; Creating a Restricted Area; Access Approvals, Denials, and Removals; Access Control Matrix; Site Access Control; Follow These Steps; System Status Checks; Troubleshooting; Historical Lessons; 10 Alarm Monitoring; Introduction; Physical Access Control System (PACS) or Intrusion Detection System (IDS) Alarms; Alarm Instructions; Receiving Alarms
- Olups, Rihards, author.
- Birmingham, UK : Packt Publishing, 2017.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Gregg, Michael (Michael C.), author.
- Indianapolis, IN : Wiley, [2015]
- Description
- Book — 1 online resource : color illustrations
- Summary
-
- Building a Hardware and Software Test Platform
- Passive Information Gathering
- Analyzing Network Traffic
- Detecting Live Systems and Analyzing Results
- Enumerating Systems
- Automating Encryption and Tunneling Techniques
- Automated Attack and Penetration Tools
- Securing Wireless Systems
- An Introduction to Malware
- Detecting Intrusions and Analyzing Malware
- Forensic Detection.
(source: Nielsen Book Data)
- Liu, Xiao.
- Waltham, MA : Elsevier, 2012.
- Description
- Book — 1 online resource (xiv, 140 p.)
- Summary
-
- Chapter 1 Introduction
- Chapter 2 Literature Review and Problem Analysis
- Chapter 3 A Scientific Cloud Workflow System
- Chapter 4 Novel Probabilistic Temporal Framework
- Chapter 5 Forecasting Scientific Cloud Workflow Activity Duration Intervals
- Chapter 6 Temporal Constraint Setting
- Chapter 7 Temporal Checkpoint Selection and Temporal Verification
- Chapter 8 Temporal Violation Handling Point Selection
- Chapter 9 Temporal Violation Handling
- Chapter 10 Conclusions and Contribution Bibliography Appendix: Notation Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Rooney, Timothy, 1962-
- Hoboken, NJ : John Wiley & Sons Inc., 2013.
- Description
- Book — 1 online resource.
- Summary
-
- ACKNOWLEDGMENTS XI INTRODUCTION XIII 1 IPv6 DEPLOYMENT DRIVERS 1 1.1 The Internet: A Success Story 1 1.1.1 Supply-Side Issues 3 1.1.2 Internet at a Crossroads 6 1.1.3 Which Internet Are You On? 7 1.2 Emerging Applications 7 1.3 IPv6 Business Case 10 2 IPv6 OVERVIEW 13 2.1 IPv6 Key Features 14 2.2 The IPv6 Header 14 2.2.1 IPv6 Extension Headers 15 2.3 IPv6 Addressing 17 2.3.1 Address Notation 18 2.3.2 Address Structure 19 2.3.3 IPv6 Address Allocations 20 2.3.4 Internet Control Message Protocol for IPv6 (ICMPv6) 27 2.3.5 IPv6 Ping 28 2.3.6 Multicast Listener Discovery 28 2.3.7 Multicast Router Discovery 31 2.3.8 Neighbor Discovery Protocol 31 2.3.9 Secure Neighbor Discovery (SEND) 33 2.3.10 Inverse Neighbor Discovery 33 2.3.11 Router Renumbering 34 2.3.12 Node Information Query 34 2.4 IPv6 Address Autoconfiguration 35 2.4.1 Modified EUI-64 Interface Identifiers 36 2.4.2 Duplicate Address Detection (DAD) 37 2.5 Mobile IPv6 38 2.6 Reserved Subnet Anycast Addresses 40 2.7 Required Host IPv6 Addresses 41 2.8 IPv6 Routing 41 3 IPv4/IPv6 CO-EXISTENCE TECHNOLOGIES 43 3.1 Dual Stack 44 3.1.1 Implementing Dual Stack 44 3.1.2 Which Address Is Used? 45 3.1.3 DNS Considerations 47 3.1.4 DHCP Considerations 48 3.2 Tunneling Approaches 49 3.2.1 Tunneling Scenarios for IPv6 Packets Over IPv4 Networks 49 3.2.2 Tunnel Types 51 3.2.3 Tunneling Scenario for IPv4 Packets Over IPv6 Networks 62 3.2.4 Tunneling Summary 63 3.3 Translation Approaches 63 3.3.1 IP/ICMP Translation 65 3.3.2 Bump in the Host (BIH) 72 3.3.3 Network Address Translation for IPv6/IPv4 (NAT64) 74 3.3.4 Other Translation Techniques 75 3.4 Application Support of IPv6 78 3.5 Service Provider IPv4/IPv6 Co-Existence 78 3.5.1 Reference Architecture 79 3.5.2 Deployment Approaches Overview 80 3.5.3 Routing Infrastructure Deployment Approaches 80 3.5.4 Comparison of Deployment Approaches 87 3.6 Addressing and DNS Considerations 87 4 IPv6 READINESS ASSESSMENT 91 4.1 Putting a Plan in Place 92 4.2 IP Network Inventory 93 4.2.1 IPv6 Readiness 93 4.2.2 Discovery 93 4.2.3 IPv6 Assessment 94 4.3 IPv6 to do List 106 4.4 IPv6 Readiness Assessment Summary 106 5 IPv6 ADDRESS PLANNING 109 5.1 Internet Registries 109 5.1.1 RIR Address Allocation Policies 111 5.1.2 Address Allocation Efficiency 112 5.2 IPv6 Address Planning 112 5.3 IPv6 Address Allocation Methods 113 5.3.1 Best-Fit Method 114 5.3.2 Sparse Allocation Method 116 5.3.3 Random Allocation 117 5.3.4 DHCPv6 Prefix Delegation 118 5.3.5 Unique Local Address Space 118 5.4 Defining Your IPv6 Address Plan 118 5.5 Multihoming and IP Address Space 122 5.6 IP Address Planning Summary 125 6 IPv6 SECURITY PLANNING 127 6.1 The Good News: IP Is IP 127 6.2 The Bad News: IPv6 Is Not IPv4 128 6.3 Update Your Security Policy 129 6.4 Network Perimeter Monitoring and Intrusion Prevention 129 6.4.1 IPv6 Address Filtering 130 6.4.2 ICMPv6 Messages 131 6.5 Extension Headers 132 6.6 Internal Network Protection 133 6.6.1 Network Reconnaissance 133 6.6.2 Network Access 134 6.6.3 DHCPv6 135 6.6.4 DNS 135 6.6.5 Anycast Addressing 136 6.6.6 Internal Network Filtering 136 6.7 Network Device Security Considerations 137 6.8 Mobile IPv6 Security 138 6.8.1 Mobility Extension Header 139 6.8.2 Mobile IPv6 Vulnerabilities 143 6.9 IPv4/IPv6 Coexistence Measures 144 6.9.1 Securing Tunneling Implementations 145 6.9.2 Securing Translation Implementations 146 6.10 Summary 148 7 IPv6 NETWORK MANAGEMENT PLANNING 149 7.1 Management Model 149 7.2 Network Management Scope 150 7.2.1 Network Inventory 150 7.2.2 IP Address Inventory 151 7.2.3 The Management Network 151 7.3 The Simple Network Management Protocol (SNMP) 152 7.3.1 Configuration Management 153 7.3.2 Fault Management 153 7.3.3 Accounting Management 154 7.3.4 Performance Management 154 7.4 Methods and Procedures 154 7.5 Summary 155 8 MANAGING THE DEPLOYMENT 157 8.1 Integrating Plans 157 8.2 Project Management 159 8.3 Testing Deployment 160 8.4 Production Deployment 161 9 MANAGING THE IPv4/IPv6 NETWORK 163 9.1 Common Network Management Tasks 163 9.2 Configuration Management 163 9.2.1 Network Allocation-Related Tasks 164 9.2.2 Adding a New Device 166 9.2.3 Deletion Tasks 167 9.2.4 Address Renumbering or Movement Tasks 168 9.2.5 Block/Subnet Splits 171 9.2.6 Block/Subnet Joins 172 9.2.7 DHCPv6 Server Configuration 173 9.2.8 DNS Server Configuration 174 9.2.9 Prefix Renumbering 175 9.3 Fault Management 176 9.3.1 Fault Detection 176 9.3.2 Troubleshooting and Fault Resolution 177 9.4 Accounting Management 177 9.4.1 Inventory Assurance 177 9.4.2 Address Reclamation 180 9.5 Performance Management 181 9.5.1 Services Monitoring 181 9.5.2 Application Performance Management 182 9.5.3 Auditing and Reporting 182 9.6 Security Management 183 9.7 Disaster Recovery/Business Continuity 183 10 IPv6 AND THE FUTURE INTERNET 185 10.1 Technology Enablers 185 10.2 The Internet's Dark Side 187 10.3 The Internet's Bright Future 187 10.3.1 Living Smarter 187 10.3.2 Keeping Track 188 10.3.3 Extensible Healthcare 188 10.3.4 Public Safety 188 10.3.5 Credit Cards of the Future 188 10.3.6 Consumer Applications 188 10.4 Conclusion 189
- APPENDIX 191 BIBLIOGRAPHY 193 INDEX 199.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
17. The wireshark field guide [electronic resource] : analyzing and troubleshooting network traffic [2013]
- Shimonski, Robert.
- Amsterdam ; Boston : Syngress, 2013.
- Description
- Book — 1 online resource : col. ill.
- Summary
-
- Chapter 1: About Wireshark
- Chapter 2: Installing Wireshark
- Chapter 3: Configuring a System
- Chapter 4: Capturing Packets
- Chapter 5: Color Codes
- Chapter 6: Filters
- Chapter 7: Sample Captures
- Chapter 8: Inspecting Packets
- Chapter 9: Deep Analysis
- Chapter 10: Saving Captures.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Oriyano, Sean-Philip.
- [Waltham, MA] : Syngress, 2012.
- Description
- Book — 1 online resource.
- Summary
-
- Introduction
- Chapter 1: Background on Attacks
- Chapter 2: A Closer Look at Client-Side Attacks
- Chapter 3: A History of Web Browsers
- Chapter 4: The Problem with Browsers
- Chapter 5: Exploring and Exploiting Active Content
- Chapter 6: Browser Defenses
- Chapter 7: E-mail Client Attacks
- Chapter 8: E-mail Client Defenses
- Chapter 9: Web Applications
- Chapter 10: Web Applications and Client Defenses
- Chapter 11: Other Client-Side Attack Targets
- Chapter 12: Malware
- Chapter 13: Client-Side Countermeasures
- Chapter 14: The Road Ahead.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
19. PCI compliance : understand and implement effective pci data security standard compliance [2022]
- Williams, Branden R., author.
- Fifth edition. - Boca Raton, FL : CRC Press, 2022.
- Description
- Book — 1 online resource
- Summary
-
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources. If you accept, process, transmit, or store payment card data branded by Visa, MasterCard, American Express, Discover, or JCB (or their affiliates and partners), you must comply with this lengthy standard. Personal data theft is at the top of the list of likely cybercrimes that modern-day corporations must defend against. In particular, credit or debit card data is preferred by cybercriminals as they can find ways to monetize it quickly from anywhere in the world. Is your payment processing secure and compliant? The new Fifth Edition of PCI Compliance has been revised to follow the new PCI DSS version 4.0, which is a complete overhaul to the standard. Also new to the Fifth Edition are: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as Kubernetes, cloud, near-field communication, point-to-point encryption, Mobile, Europay, MasterCard, and Visa. This is the first book to address the recent updates to PCI DSS and the only book you will need during your PCI DSS journey. The real-world scenarios and hands-on guidance will be extremely valuable, as well as the community of professionals you will join after buying this book. Each chapter has how-to guidance to walk you through implementing concepts and real-world scenarios to help you grasp how PCI DSS will affect your daily operations. This book provides the information that you need in order to understand the current PCI Data Security Standards and the ecosystem that surrounds them, how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally identifiable information. Our book puts security first as a way to enable compliance. Completely updated to follow the current PCI DSS version 4.0 Packed with tips to develop and implement an effective PCI DSS and cybersecurity strategy Includes coverage of new and emerging technologies such as Kubernetes, mobility, and 3D Secure 2.0 Both authors have broad information security backgrounds, including extensive PCI DSS experience
- Fadyushin, Vyacheslav, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations.
- Summary
-
- Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface;
- Chapter 1: Understanding Wireless Network Security and Risks ; Understanding wireless environment and threats; An overview of wireless technologies; An overview of wireless threats; Wi-Fi media specifics; Common WLAN protection mechanisms and their flaws; Hiding SSID; MAC filtering; WEP; WPA/WPA2; Pre-shared key mode; Enterprise mode; WPS; Getting familiar with the Wi-Fi attack workflow; General Wi-Fi attack methodology; The active attacking phase; WPA-PSK attacks
- Enterprise WLAN attacksSummary;
- Chapter 2: Planning Your Lab Environment ; Understanding what tasks your lab should fulfill; Objectives of a lab; Lab tasks; Network reconnaissance; Web application hacking; Hacking and researching network services; AD hacking; DBMS hacking; Network layer attacks; Wi-Fi penetration testing; Planning the network topology; Choosing appropriate components; Network devices; Server and workstation components; Planning lab security; Access control; Integrated security mechanisms; Security solutions; Security hints; Summary
- Chapter
- 3: Configuring Networking Lab Components General lab network communication rules; Configuring hardware wired devices; Preparing the console connection on Windows; Core switch; Initial configuration; Configuring interfaces and VLANs; Hardening the core switch; Configuring subinterfaces and subnets; Configuring auxiliary services; Basic gateway hardening; Configuring virtual wired network devices; Network virtualization platform; Software installation; Initial configuration; Network topology implementation; Switch; Gateway; Virtual host emulation; Wireless hardware devices
- Configuring WLANsGuest WLAN; Preparing the hardware access point; Summary;
- Chapter 4: Designing Application Lab Components ; Planning services; Creating virtual servers and workstations; VirtualBox overview and installation; Creating virtual machines; Configuring network settings of lab components; Installing and configuring domain services; Creating a domain; Creating users; Adding hosts to the domain; Certification authority services; Creating a root certificate; Creating a working certificate; Installing a root certificate; Installing a remote management service; Corporative e-mail service
- Configuring a DNS serverInstalling and configuring hMailServer; Installing vulnerable services; Installing web applications; Preparing a web server; WebGoat; DVWA; Liferay Portal; Metasploitable; Vulnerable VoIP server; Summary;
- Chapter 5: Implementing Security ; Network-based security solutions; Configuring network access control; Isolating external and guest networks; Isolating internal VLANs; Securing wireless access; Preparing the RADIUS server; Preparing the certificates; Configuring RADIUS; Configuring the access point; Configuring the WLAN client
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.