About the Book:
The book is a comprehensive guide to designing and implementing a secure network. This book is to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way.
Table of Contents
Chapter 1. Network Security AxiomsChapter 2. Security Policy and Operations Life CycleChapter 3. Secure Networking ThreatsChapter 4. Network Security TechnologiesChapter 5. Device HardeningChapter 6. General Design ConsiderationsChapter 7. Network Security Platform Options and Best Deployment PracticesChapter 8. Common Application Design ConsiderationsChapter 9. Identity Design ConsiderationsChapter 10. IPsec VPN Design ConsiderationsChapter 11. Supporting-Technology Design ConsiderationsChapter 12. Designing Your Security SystemChapter 13. Edge Security DesignChapter 14. Campus Security DesignChapter 15. Teleworker Security DesignChapter 16. Secure Network Management and Network Security ManagementChapter 17. Case StudiesChapter 18. Conclusions