Internet-Adressen aus dem Buch: |
Internet - Intranet - Extranet Potentiale im Unternehmen Torsten Horn R. Oldenbourg Verlag |
Zurück zur Inhaltsübersicht |
|
12 Intranet-Infrastruktur, Netzwerktechnik | |
12.1 Leitungsvermittlung, Paketvermittlung, Zellvermittlung 12.2 OSI-Sieben-Schichten-Referenzmodell der ISO 12.3 TCP/IP, DHCP, DNS, NAT, Masquerading, Routing 12.4 Netzwerktechnologien, LAN-Verkabelung 12.5 Hub, Bridge, Switch, Konzentrator, Router, Gateway 12.6 Server-Rechner und Cluster-Lösungen 12.7 Netzwerkbetriebssystem 12.8 Netzwerk-Management, System-Management, Remote Management 12.9 Helpdesk-System 12.10 Microsoft BackOffice |
|
12.1 Leitungsvermittlung, Paketvermittlung, Zellvermittlung | |
12.2 OSI-Sieben-Schichten-Referenzmodell der ISO | |
12.3 TCP/IP, DHCP, DNS, NAT, Masquerading, Routing | |
DNS Resources Directory | http://www.dns.net/dnsrd |
DE-NIC | http://www.denic.de |
InterNIC | http://www.internic.net |
IANA (Internet Assigned Numbers Authority) | http://www.iana.org |
ICANN (Internet Corporation for Assigned Numbers and Names) | http://www.icann.org |
RIPE-NCC (Reseaux IP Europeen Network Coordination Center) | http://www.ripe.net |
Next Generation Internet | http://www.ngi.gov |
Internet2 | http://www.internet2.edu |
UCAID | http://www.ucaid.edu |
12.4 Netzwerktechnologien, LAN-Verkabelung | |
Data Communications Magazine | http://www.data.com/Tutorials |
Amsys | http://www.amsys.co.uk/networklinks.html |
ATM Forum | http://www.atmforum.com |
3Com | http://www.3Com.com |
Intel | http://www.intel.com |
Proxim Inc. | http://www.proxim.com |
Aironet Wireless Communications Inc. | http://www.aironet.com |
Lucent Technologies | http://www.lucent.com |
WLANA (Wireless LAN Alliance) | http://www.wlana.com |
WIMAN (Wireless Metropolitan Area Network) | http://www.wiman.net |
Altvater Airdata Systems | http://www.altvater.com |
12.5 Hub, Bridge, Switch, Konzentrator, Router, Gateway | |
Cisco | http://www.cisco.com |
3Com | http://www.3Com.com |
Cabletron | http://www.ctron.com |
Bay Networks / Nortel | http://www.nortelnetworks.com |
Intel | http://www.intel.com |
12.6 Server-Rechner und Cluster-Lösungen | |
Compaq | http://www.compaq.de |
IBM | http://www.pc.ibm.com, http://www.ibm.de |
HP Hewlett-Packard | http://www.hewlett-packard.de |
Dell | http://www.dell.com |
Siemens | http://www.sni.de |
Sun | http://www.sun.de |
Standard Performance Evaluation Corp. | http://www.specbench.org |
VI Architecture (Virtual Interface Architecture) | http://www.viarch.org |
12.7 Netzwerkbetriebssystem | |
NetWare / IntranetWare von Novell | http://www.novell.de |
Windows NT von Microsoft | http://www.microsoft.com |
Synchronicity von NetVision | http://www.netvisn.com |
Vines von Banyan | http://www.banyan.com |
Switchboard | http://www.switchboard.com |
Linux | http://www.linux.org, http://www.linux.de |
KDE (K Desktop Environment) | http://www.kde.org |
SuSE | http://www.suse.de |
Red Hat Software Inc. | http://www.redhat.de |
Delix Computer GmbH | http://www.delix.de |
Caldera Inc. | http://www.caldera.de |
12.8 Netzwerk-Management, System-Management, Remote Management | |
Bay Networks / Nortel | http://www.nortelnetworks.com |
Cisco | http://www.cisco.com |
3Com | http://www.3Com.com |
Cabletron | http://www.ctron.com |
OpenView von Hewlett-Packard | http://www.hp.com |
TME/10 und IT Director von Tivoli/IBM | http://www.tivoli.com |
Unicenter TNG von CA Computer Associates | http://www.cai.com |
ManageWise plus Z.E.N.works von Novell | http://www.novell.de |
SMS (System Management Server, aus Microsofts BackOffice) von Microsoft | http://www.backoffice.microsoft.com |
12.9 Helpdesk-System | |
12.10 Microsoft BackOffice | |
Microsoft BackOffice | http://www.backoffice.microsoft.com |
IBM Suite for NT | http://www.software.ibm.com |
13 Sicherheit im Netz | |
13.1 Verschiedene Aspekte der Sicherheit 13.2 Sicherheitsstrategien und Hilfestellungen 13.3 Viren 13.4 Authentifizierung und Autorisierung 13.5 Verschlüsselung 13.6 Firewall 13.7 Sicherheitslücken in Web-Browsern und Betriebssystemen |
|
13.1 Verschiedene Aspekte der Sicherheit | |
13.2 Sicherheitsstrategien und Hilfestellungen | |
BSI (Bundesamt für Sicherheit in der Informationstechnik) | http://www.bsi.bund.de |
DFN-CERT | http://www.cert.dfn.de |
Universität/Gesamthochschule Siegen | http://www.uni-siegen.de/security |
ICSA (International Computer Security Association) | http://www.icsa.net |
Security bei IBM | http://www.ibm.com/security |
Xlink mit Security Check | http://www.xlink.de |
Secure Computing Corp. | http://www.securecomputing.com |
SAFEsuite von ISS Internet Security Systems | http://www.iss.net |
X-Force | http://www.iss.net/xforce |
NetRecon von Axent | http://www.axent.com |
KSA Kane Security Analyst von IDI Intrusion Detection / Security Dynamics | http://www.intrusion.com, http://www.securid.com |
DDIS (Datensicherheits- und Datenschutz-Informations-System) von Articon | http://www.articon.de |
Ballista Security Auditing System Scanner | http://www.sni.com |
Gateway to Information Security Inc. | http://www.securityserver.com |
Stalker und Webstalker von Haystack Labs Inc. | http://www.haystack.com |
UTECH Verlag | http://www.uvg.de |
GFI LANguard Network Security Scanner | http://www.gfi.com/lannetscan |
13.3 Viren | |
Stoplock von PCSL | http://www.pcsl.com |
ICSA (International Computer Security Association) | http://www.icsa.net |
F-Prot und F-Macrow von Data Fellows | ftp://ftp.f-prot.com/pub/f-prot, http://www.DataFellows.com |
Testcenter der Universität Hamburg | http://agn-www.informatik.uni-hamburg.de |
Virus Bulletins | http://www.virusbtn.com |
Norton AntiVirus von Symantec | http://www.symantec.com |
NSS (NetShield Security Suite) von McAfee / Network Associates | http://www.nai.com |
Anti-Virus Toolkit von Dr. Solomon's / Network Associates | http://www.drsolomon.com |
InocuLAN von Cheyenne / Computer Associates | http://www.cheyenne.com |
ServerProtect von Trend Micro | http://www.trendmicro.de |
F-Prot Pro von Data Fellows Ltd | http://www.DataFellows.com, http://www.DataFellows.fi |
AntiVir von H+BEDV Datentechnik GmbH | http://www.antivir.de |
InterScan VirusWall von Trend Micro | http://www.trendmicro.de |
MIMEsweeper von Integralis | http://www.integralis.de |
WebShield von McAfee / Network Associates | http://www.nai.com |
c't | http://www.heise.de/security/dienste/antivirus |
BSI (Bundesamt für Sicherheit in der Informationstechnik) | http://www.bsi.bund.de/bsi-cert |
13.4 Authentifizierung und Autorisierung | |
S/Key von Bellcore | http://www.bellcore.com |
SecurID ACE (Access Control Encryption) von Security Dynamics | http://www.securid.com |
SafeWord von Secure Computing Corp. | http://www.securecomputing.com |
OmniGuard / Defender Security Server (DSS) von Axent Technologies Inc. | http://www.axent.com |
Siemens Fingertip-Sensor | http://www.siemens.de/semiconductor |
Key Tronic / BiometriX Int. Fingerprint Scanner | http://www.user.xpoint.at/biometrix |
Biometric BioMouse Live Scan | http://www.biomouse.com |
SGS-Thomson Fingerprint-Sensor TouchChip | http://www.st.com |
FIU Fingerprint Identification Unit von Sony und I/O-Software | http://wwwe.iosoftware.com/biosols/sony/fiu, http://www.fingersec.com/fiu.htm |
Bergdata Fingerprint System | http://www.bergdata.com |
FaceIt von Visionics Corp. | http://www.faceit.com |
PersonSpotter von Marlsburg/Neven | http://www.neuroinformatik.ruhr-uni-bochum.de |
FaceVACS von Plettac Electronic Security | http://www.plettac-electronics.de |
TrueFace von Miros Inc. | http://www.miros.com |
Technology Recognition Systems / Betac International Corp. | http://www.betac.com/trs |
Unisys | http://www.marketplace.unisys.com/bioware |
IriScan Inc. | http://www.iriscan.com |
Biometric Consortium | http://www.biometrics.org |
BioAPI Consortium | http://www.bioapi.org |
TeleTrusT | http://www.teletrust.de |
13.5 Verschlüsselung | |
RSA Data Security Inc. | http://www.rsa.com |
PGP (Pretty Good Privacy) von Phil Zimmermann | http://www.nai.com |
PowerPGP | http://home.rochester.rr.com/powerpgp |
WPGP | http://www.panix.com/~jgostl/wpgp |
CryptoEx von Glück & Kanja | http://www.glueckkanja.de |
The International PGP Home Page von Ståle Schumacher | http://www.pgpi.com |
Deutsche PGP-Seite | http://pgp.de |
PGP.Net | http://www.de.pgp.net |
PGP bei c't | http://www.heise.de/pgpCA |
Individual Network e.V. | http://www.in-ca.individual.net |
MAZ Trustcenter (TC) | http://www.trustcenter.de |
Web.de TrustCenter | http://trust.web.de |
S/MIME von RSA | http://www.rsa.com/smime |
OpenPGP | http://www.ietf.org/html.charters/openpgp-charter.html |
MailTrusT von TeleTrusT | http://www.teletrust.de |
SSL (Secure Sockets Layer) von Netscape | http://home.netscape.com/products/security |
VeriSign | http://www.verisign.com |
DFN-PCA (Policy Certification Authority des DFN) | http://www.cert.dfn.de/dfnpca |
Baltimore Technologies | http://www.baltimore.ie |
Belsign | http://www.belsign.be |
Thawte Consulting | http://www.thawte.com |
Valicert | http://www.valicert.com |
C2Net | https://www.c2.net |
13.6 Firewall | |
BSI (Bundesamt für Sicherheit in der Informationstechnik) | http://www.bsi.bund.de |
KryptoWall der KryptoKom | http://www.kryptokom.de |
ICSA (International Computer Security Association) | http://www.icsa.net |
IDI Intrusion Detection / Security Dynamics | http://www.intrusion.com, http://www.securid.com |
ISS Internet Security Systems | http://www.iss.net |
Check Point FireWall-1 | http://www.checkpoint.com |
Raptor Eagle von Axent Technologies Inc. | http://www.axent.com |
BorderWare Firewall Server von Secure Computing Corp. | http://www.securecomputing.com |
Firewall 97 von AltaVista | http://www.altavista.software.digital.com |
BIGfire von Biodata | http://www.biodata.de |
Norman Firewall von Norman Data Defense Systems GmbH | http://www.norman.de |
Gauntlet Internet Firewall von TIS Trust Information Systems / Network Associates | http://www.tis.com, http://www.nai.com |
Great Circle Associates Inc. | http://www.greatcircle.com |
CERT Coordination Center | http://www.cert.org |
DFN-CERT | http://www.cert.dfn.de, http://www.fwl.dfn.de |
COAST | http://www.cs.purdue.edu/coast/firewalls |
13.7 Sicherheitslücken in Web-Browsern und Betriebssystemen | |
c't Nachrichtenticker | http://www.heise.de/newsticker/ |
Hacker's best friend von UTECH | http://www.uvg.de |
Schweizer Group 42 | http://www.swiss.net/group42 |
Hacked.Net | http://www.hacked.net |
NMRC Nomad Mobile Research Centre | http://www.nmrc.org |
L0pht Heavy Industries | http://l0pht.com/hotnews.html |
McLain | http://www.halcyon.com/mclain/ActiveX |
Tea Vui Huang | http://www.scv.com.sg/~entea/security/reggap.htm |
Spangler | http://www.ee.washington.edu/computing/iebug, http://www.security.org.il/msnetbreak, http://www.efsl.com/security/ntie |
Cyber-Snot-Bug | http://www.cybersnot.com |
Rioux und Macinta | http://web.mit.edu/crioux/www/ie/index.html |
Mesander | http://neurosis.hungry.com/~ben/msie_bug |
Java-DNS-Bug | http://www.sky.net/~williams/java/javasec.html |
infinit information | http://hacke.infinit.se |
Novell-RCGI-Bug | http://www.dunkel.de/security |
Ross, Cheng, Kobin | http://www.v.nu/core |
Trojanische Pferde bei ICSA | http://www.icsa.net |
Back Orifice (BO) von Cult of the Dead Cow (cDc) | http://www.cultdeadcow.com |
NetBus von Neikter | http://www.angelfire.com/ab/netbussite/index.html |
Hasting | http://www.pchell.com |
Dawson | http://www.tbtf.com/resource/iss-backdoor.txt |
Shockwave-Bug | http://www.webcomics.com/shockwave |
Security Config Wizard NT von Schmal/Sprejz | http://www-rnks.informatik.tu-cottbus.de/~fsch/deutsch/cfgwiz.htm |
RegEdit von Clausen | http://www.regedit.com |
Regmon von Russinovich/Cogswell | http://www.sysinternals.com/regmon.htm |
AtGuard von WRQ Inc. | http://www.atguard.com |
Heimann | http://www.it-sec.de |
ISS Internet Security Systems Inc. | http://www.iss.net/xforce |
Fyodor Exploit World | http://users.dhp.com/~fyodor/sploits.html |
m.b. new order | http://neworder.box.sk |
Trojan Horse Construction Kit | http://members.tripod.com/~THCK |
Weiter zu nächsten Kapiteln |
|
Zurück zur Inhaltsübersicht © 1999-2005 Torsten Horn, Aachen |