DNS security management / (Record no. 68916)

000 -LEADER
fixed length control field 05648cam a2200685Ii 4500
001 - CONTROL NUMBER
control field ocn993432785
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203430.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170711s2017 njua ob 001 0 eng d
019 ## -
-- 993640558
-- 993651104
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119328292
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119328292
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119331407
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119331404
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119331391
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119331390
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000060549877
029 1# - (OCLC)
OCLC library identifier CHBIS
System control number 011150693
029 1# - (OCLC)
OCLC library identifier CHNEW
System control number 000964907
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 495227722
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 508817900
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 494212829
029 1# - (OCLC)
OCLC library identifier GBVCP
System control number 1014966728
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Dooley, Michael
245 10 - TITLE STATEMENT
Title DNS security management /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource :
490 1# - SERIES STATEMENT
Series statement IEEE Press series on networks and services management
505 0# - FORMATTED CONTENTS NOTE
Remark 2 DNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 DNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Network ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Multi-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Detect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms.
520 8# - SUMMARY, ETC.
Summary, etc This work is an advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security
-- General.
700 1# - AUTHOR 2
Author 2 Rooney, Tim,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119328292
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- John Wiley and Sons, Inc. ;
-- Piscataway, NJ :
-- IEEE Press,
-- [2017]
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 0# -
-- Online resource; title from PDF title page (EBSCO, viewed July 13, 2017).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet domain names
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS
994 ## -
-- 92
-- DG1

No items available.