1 - 20
Next
Number of results to display per page
- Thomas, M.
- Paris : Democratic Books, c2010.
- Description
- Book — 168 p. : ill. ; 30 cm.
- Online
Art & Architecture Library (Bowes)
Art & Architecture Library (Bowes) | Status |
---|---|
Find it Stacks | Request (opens in new tab) |
NC1495 .D47 2010 F | Unknown |
2. Network security first-step [2012]
- Thomas, Thomas M.
- [2nd ed.]. - Indianapolis, IN : Cisco Press, ©2012.
- Description
- Book — 1 online resource (xxiv, 423 pages) : illustrations
- Summary
-
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn how hacker attacks work, from start to finish Choose the right security solution for each type of risk Create clear and enforceable security policies, and keep them up to date Establish reliable processes for responding to security advisories Use encryption effectively, and recognize its limitations Secure your network with firewalls, routers, and other devices Prevent attacks aimed at wireless networks No security experience required! Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them. Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you! .
(source: Nielsen Book Data)
3. Network security first-step [2004]
- Thomas, Thomas M.
- Indianapolis, Ind. : Cisco Press, ©2004.
- Description
- Book — 1 online resource (xxi, 456 pages) : illustrations
- Summary
-
- 1. Here There Be Hackers!
- Essentials First: Looking for a Target. Hacking Innocent Information. Targets of Opportunity. Are You a Target of Opportunity? Targets of Choice. Are You a Target of Choice? The Process of an Attack. Reconnaissance and Footprinting (a.k.a. Casing the Joint). Scanning. Enumeration. Gaining Access. Application Attacks. Misconfiguration Attacks. Script Attacks. Escalating Privilege. Covering Tracks. Network Security Organizations. SANS. Center for Internet Security (CIS). SCORE. Internet Storm Center. ICAT Metabase. Security Focus. Learning from the Network Security Organizations. Overview of Common Attacks and Exploits. Chapter Summary. Chapter Review.
- 2. Security Policies and Responses.
- Defining Trust. Acceptable Use Policy. Policy Overview. Purpose. Scope General Use and Ownership. Security and Proprietary Information. Unacceptable Use. E-mail and Communications Activities. Enforcement. Conclusion. Password Policy. Overview. Purpose. Scope. General Policy. General Password Construction Guidelines. Password Protection Standards. Enforcement. Conclusion. Virtual Private Network (VPN) Security Policy. Scope. Policy. Conclusion. Extranet Connection Policy. Scope. Security Review. Third-Party Connection Agreement. Business Case. Point of Contact. Establishing Connectivity. Modifying or Changing Connectivity and Access. Terminating Access. Conclusion. ISO Certification and Security. Sample Security Policies on the Internet. Chapter Summary. Chapter Review.
- 3. Overview of Security Technologies.
- Security First Design Concepts. Packet Filtering via Access Control Lists (ACLs). Limitations of Packet Filtering. Stateful Packet Inspection (SPI). Detailed Packet Flow Using SPI. Limitations of Stateful Packet Inspection. Network Address Translation (NAT). NAT's Limitations. Proxies and Application Level Protection. Content Filters. Public Key Infrastructure (PKI). AAA Technologies. Authorization. Accounting. Remote Authentication Dial-In User Service (RADIUS). Terminal Access Controller Access Control System (TACACS). TACACS+ Versus RADIUS. Chapter Summary. Chapter Review Questions.
- 4. Security Protocols.
- DES Encryption. Limitations of DES. Triple DES Encryption. Limitations of 3DES. Message Digest 5 Algorithm. Point-to-Point Tunneling Protocol (PPTP). Limitations of PPTP. Layer 2 Tunneling Protocol (L2TP). Benefits of L2TP. L2TP Operation. Secure Shell (SSH). SSH Operation. Tunneling and Port Forwarding. Limitations of SSH. Chapter Summary. Chapter Review Questions.
- 5. Firewalls.
- Firewall Frequently Asked Questions. Why Do I Need a Firewall? Do I Have Anything Worth Protecting? What Does a Firewall Do? Firewalls Are "The Security Policy". Firewall Operational Overview. Implementing a Firewall. Determine the Inbound Access Policy. Determine Outbound Access Policy. Essentials First: Life in the DMZ. Case Studies. Case Study: Firewall Deployment with Mail Server Inside the Protected (Internal). Case Study: Firewall Deployment with Mail Server in DMZ. Firewall Limitations. Chapter Summary. Chapter Review Questions.
- 6. Router Security.
- Edge Router as a Choke Point. Edge Router as a Packet Inspector. Content-Based Packet Inspection. Intrusion Detection with Cisco IOS. When to Use the FFS IDS. FFS IDS Operational Overview. FFS Limitations. Secure IOS Template. Chapter Summary. Chapter Review Questions.
- 7. IPSec Virtual Private Networks (VPNs).
- Analogy: VPNs Connect IsLANds Securely. VPN Overview. VPN Benefits and Goals. VPN Implementation Strategies. Split Tunneling. Overview of IPSec VPNs. Tunneling Data. Encryption Modes. Transport Mode. IPSec Protocols. Internet Key Exchange (IKE). ISAKMP Overview. IPSec Operational Overview. IKE Phase
- 2. Diffie-Hellman Algorithm. Router Configuration as VPN Peer. Configuring IPSec. Step
- 2: Create the IPSec Transforms. Step
- 3: Create the Crypto Map. Step
- 4: Apply the Crypto Map to an Interface. Firewall VPN Configuration for Client Access. Chapter Summary. Chapter Review Questions.
- 8. Wireless Security.
- Essentials First: Wireless LANs. Benefits of Wireless LANs. Wireless Equals Radio Frequency. Wireless Networking. Coverage. Bandwidth Availability. WarGames Wirelessly. WarDriving. WarFlying. WarSpamming. WarSpying. Wireless Threats. Denial of Service Attacks. Rogue/Unauthorized Access Points. Incorrectly Configured Access Points. Network Abuses. Wireless Security. Device and Access Point Association. Wired Equivalent Privacy (WEP). MAC Address Filtering. Extensible Authentication Protocol (EAP). LEAP (EAP-Cisco). EAP-TLS EAP-TTLS. Essentials First: Wireless Hacking Tools. Wireless Packet Sniffers. AirSNORT. Chapter Summary. Chapter Review Questions.
- 9. Intrusion Detection and Honeypots.
- Essentials First: Intrusion Detection. IDS Functional Overview. Host Intrusion Detection System (HIDS). How Are Intrusions Detected? Protocol Analysis. Anomaly Detection. Signature/Pattern Matching. Log Analysis. Combining Methods. Intrusion Prevention. IPS Responses and Actions. IDS Products. Essentials First: Honeypots. Honeypot Limitations. Chapter Summary. Chapter Review Questions.
- 10. Tools of the Trade.
- Essentials First: Vulnerability Analysis. Fundamental Attacks. Packet Sniffers. Denial of Service (DoS) Attacks. Man-in-the-Middle Attacks. Back Doors. Miscellaneous Attacks. Security Assessments and Penetration Testing. Internal Vulnerability and Penetration Assessment. External Penetration and Vulnerability Assessment. Physical Security Assessment. Miscellaneous Assessments. Vulnerability Scanners. Features and Benefits of Vulnerability Scanners. Nessus. In Their Own Words. Scan and Detection Accuracy. Documentation and Support. Reporting. Vulnerability Updates. Retina. Scan and Detection Accuracy. Documentation and Support. Reporting. Vulnerability Updates. Penetration Testing Products. Scan and Detection Accuracy. Documentation. Documentation and Support. Vulnerability Updates. Core Impact In Action. Chapter Summary. Chapter Review Questions.
- Appendix A: Answers to Chapter Review Questions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
4. OSPF network design solutions [2003]
- Thomas, Thomas M.
- 2nd ed. - Indianapolis, Ind. : Cisco Press, ©2003.
- Description
- Book — 1 online resource (xx, 747 pages) : illustrations Digital: text file.
- Summary
-
The comprehensive reference for OSPF network design and deployment Understand the full dynamics of OSPF network components, how they interact with one another, and how to configure them Increase the efficiency of your OSPF network through a variety of performance tuning techniques Apply load balancing to enhance OSPF's capability to adapt to network topology changes Ensure seamless communication between OSPF and other Interior Gateway Protocols (IGPs) and OSPF and BGP through redistribution Optimize network stability and efficiency with OSPF summarization Maximize your ability to properly manage an ever-changing OSPF network landscape through Simple Network Management Protocol (SNMP) and Management Information Bases (MIBs) Develop a practiced, tested security plan to protect your OSPF network Optimize the efficiency and bandwidth of your OSPF network through the integration of MPLS Complete your basic OSPF knowledge gaps with a boiled down summary of the OSPF RFCs One of the most prevalent Interior Gateway Protocols (IGPs), OSPF is in use in numerous networks across the globe. Open Shortest Path First (OSPF) is also one of the most widely tested protocols if you choose to pursue a networking certification. From a technical perspective, the overwhelming presence of OSPF ensures that you will encounter it at some point in your career. As a result, every networking professional should understand how OSPF operates, how to configure and troubleshoot this important protocol, and most importantly how to design a network that uses OSPF. OSPF Network Design Solutions, Second Edition provides comprehensive coverage of OSPF network design, deployment, management, and troubleshooting. The book begins in Part I by providing you with a common-sense understanding of the primary building blocks of internetworking, and follows up with a detailed examination of how OSPF fits into the big picture. You will also learn how OSPF neighboring routers communicate with one another via link-state advertisements (LSAs) and how to optimize this communication for network efficiency. Part II begins with a detailed explanation of how to apply the "golden rules of design" to create an optimal OSPF network and follows up with a logical approach to configuring OSPF routers and areas. Part II concludes with hard-to-find information about how to redistribute RIP into OSPF and OSPF into BGP as well as how to make your OSPF network more efficient through summarization. Part III provides you with detailed information about how to keep pace with network growth through tested network management tools and techniques. Furthermore, you will learn how to secure your OSPF network from inside and outside attackers and how to troubleshoot your network should problems arise. Part III concludes with timely information about how to accommodate BGP and MPLS in an OSPF network.
(source: Nielsen Book Data)
- Bolin, Thomas M.
- Sheffield, Eng. : Sheffield Academic Press, c1997.
- Description
- Book — 217 p. ; 24 cm.
- Online
Green Library
Green Library | Status |
---|---|
Find it Stacks | Request (opens in new tab) |
BS1605.2 .B64 1997 | Unknown |
- Power, Thomas M.
- 2nd ed. - Armonk, N.Y. : M.E. Sharpe, c1996.
- Description
- Book — xv, 251 p. : ill. ; 24 cm.
- Summary
-
This text takes issue with the notion that economic well-being of people derives only from quantitatively expanding commercial business activity. It argues that economic qualities flow from the natural and social environment, and that they are public, not private, in character.
(source: Nielsen Book Data)
- Online
Green Library
Green Library | Status |
---|---|
Find it Stacks | Request (opens in new tab) |
HB171 .P697 1996 | Unknown |
- Frederiksen, Thomas M.
- Rev. ed. - New York : McGraw-Hill, c1989.
- Description
- Book — xvii, 185 p. : ill. ; 25 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK7874 .F678 1989 | Available |
- Disch, Thomas M.
- Boston : Gregg Press, 1977.
- Description
- Book — xxxii, 334 p. ; 21 cm.
- Summary
-
- White Fang goes dingo.--Return of the Medusae.--Bone of contention.--The demi-urge.--The princess' carillon.--Final audit.--Utopia? Never!--Genetic coda.--5 eggs.--Dangerous flags.--The vamp.--The leader of the revolution.--102 H-bombs.--The sightseers.--Invaded by love.--The puppies of Terra.
- Online
Green Library
Green Library | Status |
---|---|
Find it Stacks | Request (opens in new tab) |
PS3554 .I8 E3 | Unknown |
- Flynn, Thomas M.
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1975
- Description
- Book — 1 online resource
- Stabler, Thomas M.
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1973
- Description
- Book — 1 online resource
11. Membrane separations in chemical processing [1982]
- Flynn, Thomas M.
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1982
- Description
- Book — 1 online resource
- Stabler, Thomas M.
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1971.
- Description
- Book — 1 online resource.
13. Mankind under the leash ; Planet of exile [1966]
- Disch, Thomas M., author.
- New York : Ace Books, 1966
- Description
- Book — 140, 113 pages : illustrations ; 17 cm
- Summary
-
Mankind under the leash: Aliens took over the earth in the 1970's and made mankind their slaves. A huge solar flare caused the aliens to temporarily lose their power and allowed mankind a chance to fight for their freedom
Planet of exile: A colony of humans was stranded for 600 years on a strange planet and had to team up with a group of natives to fight off the barbarians intent on destroying them
- Online
Special Collections
Special Collections | Status |
---|---|
Felton Collection | Request on-site access (opens in new tab) |
(no call number) | Unavailable In process |
- Schmidt, Thomas M.
- Frankfurt am Main : Clavis, c2007.
- Description
- Book — 248 p. ; 22 cm.
- Online
Green Library
Green Library | Status |
---|---|
Find it Stacks | Request (opens in new tab) |
BL795 .E5 S36 2007 | Unknown |
- Schmidt, Thomas M.
- Frankfurt am Main : Clavis, c2007.
- Description
- Book — 195 p. ; 22 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
BF1421 .S36 2007 | Available |
16. Black Alice [1969]
- Disch, Thomas M.
- London, W. H. Allen, 1969.
- Description
- Book — 240 p. 21 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
PS3554.I8 B52 1969 | Available |
17. Black Alice, a novel [1968]
- Disch, Thomas M.
- [1st ed.] - Garden City, N.Y., Doubleday, 1968.
- Description
- Book — 235 p. 22 cm.
- Online
Green Library
Green Library | Status |
---|---|
Find it Stacks | Request (opens in new tab) |
PS3554.E47 B5 | Unknown |
- Franck, Thomas M.
- New York, N.Y. (801 United Nations Plaza, New York 10017) : United Nations Institute for Training and Research, c1982.
- Description
- Book — vi, 20 p. ; 23 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HF1411 .F66 1982 | Available |
19. Differential equations for engineers [1978]
- Creese, Thomas M.
- New York : McGraw-Hill, c1978.
- Description
- Book — xvo, 552 p. : graphs ; 25 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TA347 .D45 C73 | Available |
- Johnson, Thomas M.
- Osceola, Mo., 1908.
- Description
- Book — 82 p. 22 cm. (8vo)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
184.1 .J69 | Available |
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.