DNS Security Management

DNS Security Management

by Michael Dooley and Timothy Rooney
English | 2017 | ISBN: 1119328276 | 324 Pages | ePUB | 4.57 MB

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies.

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors-noted experts on the topic-offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented.

Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC). In addition, the text includes discussions on security applications facility by DNS, such as anti-spam, SPF, DANE and related CERT/SSHFP records. This important resource:

- Presents security approaches for the various types of DNS deployments by role (e.g., recursive vs. authoritative)
- Discusses DNS resolvers including host access protections, DHCP configurations and DNS recursive server IPs
- Examines DNS data collection, data analytics, and detection strategies

With cyber attacks ever on the rise worldwide, DNS Security Management offers network engineers a much-needed resource that provides a clear understanding of the threats to networks in order to mitigate the risks and assess the strategies to defend against threats.



[Fast Download] DNS Security Management

Ebooks related to "DNS Security Management" :
Cisco Next-Generation Security Solutions
The Cyber Risk Handbook : Creating and Measuring Effective Cybersecurity Capabilities
Introduction to Machine Learning with Applications in Information Security
Contemporary Physics Plays: Making Time to Know Responsibility
NoNonsense ISIS and Syria: The new global war on terror (No-Nonsense Guides)
Information Security and Privacy
Cyber Terrorism: Political and Economic Implications
Web Penetration Testing with Kali Linux
Hackers: Heroes of the Computer Revolutio
Engineering Secure Future Internet Services and Systems: Current Research
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.