About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Understanding NTP; A Brief History of Time Synchronization; The Importance of Time Synchronization in Modern Networks; The Network Time Protocol; Understanding NTP; NTP from the Client Side; NTP Server Configuration; NTP Reference Implementation; NTP Authentication; Mapping the Network Time Protocol; Conclusions; Chapter 2: Issues in NTP Security; A History of NTP Attacks; Why Is NTP So Insecure?; The Problem with "Set It and Forget It" Protocols; Analysis of NTP Traffic; Conclusions
متن يادداشت
Broadcast AttacksImplementing BCP38; NTP Pooling; NTP Over Multicast/Manycast; Multicast; Manycast; Conclusions; Chapter 6: Alternatives to NTP; NTPSec; Ntimed; tlsdate; Precision Time Protocol (PTP); Conclusions; Index
متن يادداشت
Chapter 3: Vulnerabilities in NTPVulnerabilities in the Daemon; Vulnerabilities in the Protocol; Flaws in NTP Encryption and Authentication; Symmetric Encryption; AutoKey; NTP Use in DDoS Attacks; Conclusions; Chapter 4: Securing NTP; Collecting NTP Information; Hardening an NTP Installation; Running NTP in a Chroot Jail; Run NTP As an Unprivileged User; Protecting NTP Communication; Securing the ntp.conf File; Secure Configurations on Juniper and Cisco; Monitoring NTP Traffic; Alerting on NTP Security Issues; Correlating Alerts; Conclusions; Chapter 5: Securing NTP Infrastructure; BCP38
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer networks-- Security measures.
موضوع مستند نشده
Network Time Protocol (Computer network protocol)
مقوله موضوعی
موضوع مستند نشده
COM-- 013000
موضوع مستند نشده
COM-- 014000
موضوع مستند نشده
COM-- 018000
موضوع مستند نشده
COM-- 032000
موضوع مستند نشده
COM-- 037000
موضوع مستند نشده
COM-- 052000
موضوع مستند نشده
COM-- 067000
رده بندی ديویی
شماره
004
.
6/2
ويراست
23
رده بندی کنگره
شماره رده
TK5105
.
575
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )