TY - BOOK AU - DeLaet,Gert AU - Schauwers,Gert TI - Network security fundamentals T2 - Cisco Press fundamentals series SN - 1-58705-167-2 PY - 2004/// CY - Indianapolis PB - Cisco Press KW - Criptografía (Informática) KW - Seguridad informática KW - Datos KW - Protección N1 - Indice; Bibliografía N2 - Índice: I. INTRODUCTION.1. Network Security Overview. Defining Trust. MostTrusted. Less Trusted. Least Trusted. Weaknesses and Vulnerabilities. Responsibilities for Network Security. Security Objectives. Conclusion. Q&A.2. Understanding Vulnerabilities-The Need for Security. Risk and Vulnerability. TCP/IP Suite Weaknesses. IP. TCP. TCP/IP Security Issues. Countermeasures. Buffer Overflows. Buffer Overflow Mechanisms. Buffer Overflow Protection. Countermeasures. Spoofing Techniques. Address Resolution Protocol Spoofing. Domain Name Service Spoofing. Countermeasures. Social Engineering. Techniques. Countermeasures.... Etc ER -