000 | 05648cam a2200685Ii 4500 | ||
---|---|---|---|
001 | ocn993432785 | ||
003 | OCoLC | ||
005 | 20220711203430.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170711s2017 njua ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dIDEBK _dEBLCP _dYDX _dUIU _dNRC _dOCLCQ _dUAB _dUIU _dCOO _dUPM _dOCLCA _dOCLCQ |
||
019 |
_a993640558 _a993651104 |
||
020 |
_a9781119328292 _q(electronic bk.) |
||
020 |
_a1119328292 _q(electronic bk.) |
||
020 | _a9781119331407 | ||
020 | _a1119331404 | ||
020 | _a9781119331391 | ||
020 | _a1119331390 | ||
020 | _z9781119328278 | ||
020 | _z1119328276 | ||
029 | 1 |
_aAU@ _b000060549877 |
|
029 | 1 |
_aCHBIS _b011150693 |
|
029 | 1 |
_aCHNEW _b000964907 |
|
029 | 1 |
_aCHVBK _b495227722 |
|
029 | 1 |
_aCHVBK _b508817900 |
|
029 | 1 |
_aDEBSZ _b494212829 |
|
029 | 1 |
_aGBVCP _b1014966728 |
|
035 |
_a(OCoLC)993432785 _z(OCoLC)993640558 _z(OCoLC)993651104 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aDooley, Michael _c(Computer scientist), _eauthor. _97613 |
|
245 | 1 | 0 |
_aDNS security management / _cMichael Dooley, Timothy Rooney. |
264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley and Sons, Inc. ; _aPiscataway, NJ : _bIEEE Press, _c[2017] |
|
300 |
_a1 online resource : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aIEEE Press series on networks and services management | |
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed July 13, 2017). | |
505 | 0 | _aDNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages. | |
505 | 8 | _aDNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS. | |
505 | 8 | _aNetwork ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers. | |
505 | 8 | _aMulti-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance. | |
505 | 8 | _aDetect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms. | |
520 | 8 | _aThis work is an advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies. | |
650 | 0 |
_aInternet domain names _xSecurity measures. _97614 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh _97615 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aRooney, Tim, _eauthor. _97616 |
|
776 | 0 | 8 |
_iPrint version: _aDooley, Michael (Computer scientist). _tDNS security management. _dHoboken, New Jersey : John Wiley and Sons, Inc. ; Piscataway, NJ : IEEE Press, [2017] _z9781119328278 _z1119328276 _w(OCoLC)974672804 |
830 | 0 |
_aIEEE Press series on networks and services management. _97415 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119328292 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c68916 _d68916 |