DNS security management / (Record no. 74513)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05461nam a2200649 i 4500 |
001 - CONTROL NUMBER | |
control field | 8006402 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220712205950.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 171030s2008 maua ob 001 eng d |
019 ## - | |
-- | 993640558 |
-- | 993651104 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119328292 |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119331407 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119331404 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119331391 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119331390 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Dooley, Michael |
245 10 - TITLE STATEMENT | |
Title | DNS security management / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF : |
490 1# - SERIES STATEMENT | |
Series statement | IEEE Press series on networks and services management |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | DNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | DNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Network ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Multi-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Detect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms |
520 8# - SUMMARY, ETC. | |
Summary, etc | This work is an advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
Subject | Internet domain names |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
Subject | Computer security. |
700 1# - AUTHOR 2 | |
Author 2 | Rooney, Tim, |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8006402 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Hoboken, New Jersey : |
-- | John Wiley and Sons, Inc. ; |
-- | Piscataway, NJ : |
-- | IEEE Press, |
-- | [2017] |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [2017] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | Online resource; title from PDF title page (EBSCO, viewed July 13, 2017) |
No items available.