Wiley | DNS Security Management (2017 EN)

Discussion in 'Computing' started by Kanka, Jul 16, 2017.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,086
    Likes Received:
    446
    Trophy Points:
    83
    [​IMG]

    Author: Michael Dooley, Timothy Rooney
    Full Title: DNS Security Management
    Publisher: Wiley-IEEE Press; 1 edition (August 14, 2017)
    Year: 2017
    ISBN-13: 9781119328278 (978-1-119-32827-8)
    ISBN-10: 1119328276
    Pages: 324
    Language: English
    Genre: Computer science: Networking Security
    File type: PDF (True, but nonnative Cover)
    Quality: 9/10
    Price: 101.40 €


    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies

    DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented.

    Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC). In addition, the text includes discussions on security applications facility by DNS, such as anti-spam, SPF, DANE and related CERT/SSHFP records. This important resource:

    « Presents security approaches for the various types of DNS deployments by role (e.g., recursive vs. authoritative)
    « Discusses DNS resolvers including host access protections, DHCP configurations and DNS recursive server IPs
    « Examines DNS data collection, data analytics, and detection strategies

    With cyber attacks ever on the rise worldwide, DNS Security Management offers network engineers a much-needed resource that provides a clear understanding of the threats to networks in order to mitigate the risks and assess the strategies to defend against threats.

    -------------
     
    Last edited by a moderator: Mar 28, 2020