LEADER 01590nam 2200529 450 001 9910788360703321 005 20230617021412.0 010 $a87-7867-948-6 035 $a(CKB)3170000000047482 035 $a(EBL)4186934 035 $a(SSID)ssj0001325729 035 $a(PQKBManifestationID)11740914 035 $a(PQKBTitleCode)TC0001325729 035 $a(PQKBWorkID)11517204 035 $a(PQKB)10683534 035 $a(MiAaPQ)EBC4186934 035 $a(Au-PeEL)EBL4186934 035 $a(CaPaEBR)ebr11128190 035 $a(OCoLC)935248962 035 $a(EXLCZ)993170000000047482 100 $a20160104h20042004 uy 0 101 0 $adan 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBørnelitteratur $emellem kunst og pædagogik /$fTorben Weinreich 205 $a12. udgave. 210 1$aFrederiksberg, Denmark :$cRoskilde Universitetsforlag,$d2004. 210 4$d©2004 215 $a1 online resource (176 p.) 300 $aDescription based upon print version of record. 311 $a87-7867-268-6 320 $aIncludes bibliographical references. 606 $aChildren's literature$xHistory and criticism 606 $aChildren's literature$vIllustrations 615 0$aChildren's literature$xHistory and criticism. 615 0$aChildren's literature 676 $a809.89282 700 $aWeinreich$b Torben$01580766 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788360703321 996 $aBørnelitteratur$93861935 997 $aUNINA LEADER 04946nam 2200601 450 001 9910831088203321 005 20240219154949.0 010 $a1-119-33139-0 010 $a1-119-33140-4 010 $a1-119-32829-2 024 7 $a10.1002/9781119328292 035 $a(CKB)3710000001507790 035 $a(CaBNVSL)mat08006402 035 $a(IDAMS)0b00006485e6511c 035 $a(IEEE)8006402 035 $a(MiAaPQ)EBC4908164 035 $a(PPN)26859774X 035 $a(OCoLC)993432785 035 $a(EXLCZ)993710000001507790 100 $a20171030d2008 uy 101 0 $aeng 135 $aur|n||||||||| 181 $2rdacontent 182 $2isbdmedia 183 $2rdacarrier 200 10$aDNS security management /$fMichael Dooley, Timothy Rooney 210 1$aHoboken, New Jersey :$cJohn Wiley and Sons, Inc. ;$aPiscataway, NJ :$cIEEE Press,$d[2017] 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2017] 215 $a1 PDF $cillustrations 225 1 $aIEEE Press series on networks and services management 311 $a1-119-32827-6 320 $aIncludes bibliographical references and index. 327 $aDNS Security Management; Contents; Preface; Acknowledgments; 1 Introduction; Why Attack DNS?; Network Disruption; DNS as a Backdoor; DNS Basic Operation; Basic DNS Data Sources and Flows; DNS Trust Model; DNS Administrator Scope; Security Context and Overview; Cybersecurity Framework Overview; Framework Implementation; Whats Next; 2 Introduction to the Domain Name System (DNS); DNS Overview -- Domains and Resolution; Domain Hierarchy; Name Resolution; Zones and Domains; Dissemination of Zone Information; Additional Zones; Resolver Configuration; Summary; 3 DNS Protocol and Messages 327 $aDNS Message FormatEncoding of Domain Names; Name Compression; Internationalized Domain Names; DNS Message Format; DNS Update Messages; The DNS Resolution Process Revisited; DNS Resolution Privacy Extension; Summary; 4 DNS Vulnerabilities; Introduction; DNS Data Security; DNS Information Trust Model; DNS Information Sources; DNS Risks; DNS Infrastructure Risks and Attacks; DNS Service Availability; Hardware/OS Attacks; DNS Service Denial; Pseudorandom Subdomain Attacks; Cache Poisoning Style Attacks; Authoritative Poisoning; Resolver Redirection Attacks; Broader Attacks that Leverage DNS 327 $aNetwork ReconnaissanceDNS Rebinding Attack; Reflector Style Attacks; Data Exfiltration; Advanced Persistent Threats; Summary; 5 DNS Trust Sectors; Introduction; Cybersecurity Framework Items; Identify; Protect; Detect; DNS Trust Sectors; External DNS Trust Sector; Basic Server Configuration; DNS Hosting of External Zones; External DNS Diversity; Extranet DNS Trust Sector; Recursive DNS Trust Sector; Tiered Caching Servers; Basic Server Configuration; Internal Authoritative DNS Servers; Basic Server Configuration; Additional DNS Deployment Variants; Internal Delegation DNS Master/Slave Servers 327 $aMulti-Tiered Authoritative ConfigurationsHybrid Authoritative/Caching DNS Servers; Stealth Slave DNS Servers; Internal Root Servers; Deploying DNS Servers with Anycast Addresses; Other Deployment Considerations; High Availability; Multiple Vendors; Sizing and Scalability; Load Balancers; Lab Deployment; Putting It All Together; 6 Security Foundation; Introduction; Hardware/Asset Related Framework Items; Identify: Asset Management; Identify: Business Environment; Identify: Risk Assessment; Protect: Access Control; Protect: Data Security; Protect: Information Protection; Protect: Maintenance 327 $aDetect: Anomalies and EventsDetect: Security Continuous Monitoring; Respond: Analysis; Respond: Mitigation; Recover: Recovery Planning; Recover: Improvements; DNS Server Hardware Controls; DNS Server Hardening; Additional DNS Server Controls; Summary; 7 Service Denial Attacks; Introduction; Denial of Service Attacks; Pseudorandom Subdomain Attacks; Reflector Style Attacks; Detecting Service Denial Attacks; Denial of Service Protection; DoS/DDoS Mitigation; Bogus Queries Mitigation; PRSD Attack Mitigation; Reflector Mitigation; Summary; 8 Cache Poisoning Defenses; Introduction; Attack Forms 330 8 $aThis work is an advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies. 410 0$aIEEE Press series on networks and services management. 606 $aComputer security 606 $aInternet domain names$xSecurity measures 615 0$aComputer security. 615 0$aInternet domain names$xSecurity measures. 676 $a005.8 700 $aDooley$b Michael$c(Computer scientist),$0124601 702 $aRooney$b Tim 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910831088203321 996 $aDNS security management$94029784 997 $aUNINA