|
Internet-Adressen aus dem Buch: |
Internet - Intranet - Extranet Potentiale im Unternehmen Torsten Horn R. Oldenbourg Verlag |
|
Zurück zur Inhaltsübersicht |
|
| 12 Intranet-Infrastruktur, Netzwerktechnik | |
|
12.1 Leitungsvermittlung, Paketvermittlung, Zellvermittlung 12.2 OSI-Sieben-Schichten-Referenzmodell der ISO 12.3 TCP/IP, DHCP, DNS, NAT, Masquerading, Routing 12.4 Netzwerktechnologien, LAN-Verkabelung 12.5 Hub, Bridge, Switch, Konzentrator, Router, Gateway 12.6 Server-Rechner und Cluster-Lösungen 12.7 Netzwerkbetriebssystem 12.8 Netzwerk-Management, System-Management, Remote Management 12.9 Helpdesk-System 12.10 Microsoft BackOffice |
|
| 12.1 Leitungsvermittlung, Paketvermittlung, Zellvermittlung | |
| 12.2 OSI-Sieben-Schichten-Referenzmodell der ISO | |
| 12.3 TCP/IP, DHCP, DNS, NAT, Masquerading, Routing | |
| DNS Resources Directory | http://www.dns.net/dnsrd |
| DE-NIC | http://www.denic.de |
| InterNIC | http://www.internic.net |
| IANA (Internet Assigned Numbers Authority) | http://www.iana.org |
| ICANN (Internet Corporation for Assigned Numbers and Names) | http://www.icann.org |
| RIPE-NCC (Reseaux IP Europeen Network Coordination Center) | http://www.ripe.net |
| Next Generation Internet | http://www.ngi.gov |
| Internet2 | http://www.internet2.edu |
| UCAID | http://www.ucaid.edu |
| 12.4 Netzwerktechnologien, LAN-Verkabelung | |
| Data Communications Magazine | http://www.data.com/Tutorials |
| Amsys | http://www.amsys.co.uk/networklinks.html |
| ATM Forum | http://www.atmforum.com |
| 3Com | http://www.3Com.com |
| Intel | http://www.intel.com |
| Proxim Inc. | http://www.proxim.com |
| Aironet Wireless Communications Inc. | http://www.aironet.com |
| Lucent Technologies | http://www.lucent.com |
| WLANA (Wireless LAN Alliance) | http://www.wlana.com |
| WIMAN (Wireless Metropolitan Area Network) | http://www.wiman.net |
| Altvater Airdata Systems | http://www.altvater.com |
| 12.5 Hub, Bridge, Switch, Konzentrator, Router, Gateway | |
| Cisco | http://www.cisco.com |
| 3Com | http://www.3Com.com |
| Cabletron | http://www.ctron.com |
| Bay Networks / Nortel | http://www.nortelnetworks.com |
| Intel | http://www.intel.com |
| 12.6 Server-Rechner und Cluster-Lösungen | |
| Compaq | http://www.compaq.de |
| IBM | http://www.pc.ibm.com, http://www.ibm.de |
| HP Hewlett-Packard | http://www.hewlett-packard.de |
| Dell | http://www.dell.com |
| Siemens | http://www.sni.de |
| Sun | http://www.sun.de |
| Standard Performance Evaluation Corp. | http://www.specbench.org |
| VI Architecture (Virtual Interface Architecture) | http://www.viarch.org |
| 12.7 Netzwerkbetriebssystem | |
| NetWare / IntranetWare von Novell | http://www.novell.de |
| Windows NT von Microsoft | http://www.microsoft.com |
| Synchronicity von NetVision | http://www.netvisn.com |
| Vines von Banyan | http://www.banyan.com |
| Switchboard | http://www.switchboard.com |
| Linux | http://www.linux.org, http://www.linux.de |
| KDE (K Desktop Environment) | http://www.kde.org |
| SuSE | http://www.suse.de |
| Red Hat Software Inc. | http://www.redhat.de |
| Delix Computer GmbH | http://www.delix.de |
| Caldera Inc. | http://www.caldera.de |
| 12.8 Netzwerk-Management, System-Management, Remote Management | |
| Bay Networks / Nortel | http://www.nortelnetworks.com |
| Cisco | http://www.cisco.com |
| 3Com | http://www.3Com.com |
| Cabletron | http://www.ctron.com |
| OpenView von Hewlett-Packard | http://www.hp.com |
| TME/10 und IT Director von Tivoli/IBM | http://www.tivoli.com |
| Unicenter TNG von CA Computer Associates | http://www.cai.com |
| ManageWise plus Z.E.N.works von Novell | http://www.novell.de |
| SMS (System Management Server, aus Microsofts BackOffice) von Microsoft | http://www.backoffice.microsoft.com |
| 12.9 Helpdesk-System | |
| 12.10 Microsoft BackOffice | |
| Microsoft BackOffice | http://www.backoffice.microsoft.com |
| IBM Suite for NT | http://www.software.ibm.com |
| 13 Sicherheit im Netz | |
|
13.1 Verschiedene Aspekte der Sicherheit 13.2 Sicherheitsstrategien und Hilfestellungen 13.3 Viren 13.4 Authentifizierung und Autorisierung 13.5 Verschlüsselung 13.6 Firewall 13.7 Sicherheitslücken in Web-Browsern und Betriebssystemen |
|
| 13.1 Verschiedene Aspekte der Sicherheit | |
| 13.2 Sicherheitsstrategien und Hilfestellungen | |
| BSI (Bundesamt für Sicherheit in der Informationstechnik) | http://www.bsi.bund.de |
| DFN-CERT | http://www.cert.dfn.de |
| Universität/Gesamthochschule Siegen | http://www.uni-siegen.de/security |
| ICSA (International Computer Security Association) | http://www.icsa.net |
| Security bei IBM | http://www.ibm.com/security |
| Xlink mit Security Check | http://www.xlink.de |
| Secure Computing Corp. | http://www.securecomputing.com |
| SAFEsuite von ISS Internet Security Systems | http://www.iss.net |
| X-Force | http://www.iss.net/xforce |
| NetRecon von Axent | http://www.axent.com |
| KSA Kane Security Analyst von IDI Intrusion Detection / Security Dynamics | http://www.intrusion.com, http://www.securid.com |
| DDIS (Datensicherheits- und Datenschutz-Informations-System) von Articon | http://www.articon.de |
| Ballista Security Auditing System Scanner | http://www.sni.com |
| Gateway to Information Security Inc. | http://www.securityserver.com |
| Stalker und Webstalker von Haystack Labs Inc. | http://www.haystack.com |
| UTECH Verlag | http://www.uvg.de |
| GFI LANguard Network Security Scanner | http://www.gfi.com/lannetscan |
| 13.3 Viren | |
| Stoplock von PCSL | http://www.pcsl.com |
| ICSA (International Computer Security Association) | http://www.icsa.net |
| F-Prot und F-Macrow von Data Fellows | ftp://ftp.f-prot.com/pub/f-prot, http://www.DataFellows.com |
| Testcenter der Universität Hamburg | http://agn-www.informatik.uni-hamburg.de |
| Virus Bulletins | http://www.virusbtn.com |
| Norton AntiVirus von Symantec | http://www.symantec.com |
| NSS (NetShield Security Suite) von McAfee / Network Associates | http://www.nai.com |
| Anti-Virus Toolkit von Dr. Solomon's / Network Associates | http://www.drsolomon.com |
| InocuLAN von Cheyenne / Computer Associates | http://www.cheyenne.com |
| ServerProtect von Trend Micro | http://www.trendmicro.de |
| F-Prot Pro von Data Fellows Ltd | http://www.DataFellows.com, http://www.DataFellows.fi |
| AntiVir von H+BEDV Datentechnik GmbH | http://www.antivir.de |
| InterScan VirusWall von Trend Micro | http://www.trendmicro.de |
| MIMEsweeper von Integralis | http://www.integralis.de |
| WebShield von McAfee / Network Associates | http://www.nai.com |
| c't | http://www.heise.de/security/dienste/antivirus |
| BSI (Bundesamt für Sicherheit in der Informationstechnik) | http://www.bsi.bund.de/bsi-cert |
| 13.4 Authentifizierung und Autorisierung | |
| S/Key von Bellcore | http://www.bellcore.com |
| SecurID ACE (Access Control Encryption) von Security Dynamics | http://www.securid.com |
| SafeWord von Secure Computing Corp. | http://www.securecomputing.com |
| OmniGuard / Defender Security Server (DSS) von Axent Technologies Inc. | http://www.axent.com |
| Siemens Fingertip-Sensor | http://www.siemens.de/semiconductor |
| Key Tronic / BiometriX Int. Fingerprint Scanner | http://www.user.xpoint.at/biometrix |
| Biometric BioMouse Live Scan | http://www.biomouse.com |
| SGS-Thomson Fingerprint-Sensor TouchChip | http://www.st.com |
| FIU Fingerprint Identification Unit von Sony und I/O-Software | http://wwwe.iosoftware.com/biosols/sony/fiu, http://www.fingersec.com/fiu.htm |
| Bergdata Fingerprint System | http://www.bergdata.com |
| FaceIt von Visionics Corp. | http://www.faceit.com |
| PersonSpotter von Marlsburg/Neven | http://www.neuroinformatik.ruhr-uni-bochum.de |
| FaceVACS von Plettac Electronic Security | http://www.plettac-electronics.de |
| TrueFace von Miros Inc. | http://www.miros.com |
| Technology Recognition Systems / Betac International Corp. | http://www.betac.com/trs |
| Unisys | http://www.marketplace.unisys.com/bioware |
| IriScan Inc. | http://www.iriscan.com |
| Biometric Consortium | http://www.biometrics.org |
| BioAPI Consortium | http://www.bioapi.org |
| TeleTrusT | http://www.teletrust.de |
| 13.5 Verschlüsselung | |
| RSA Data Security Inc. | http://www.rsa.com |
| PGP (Pretty Good Privacy) von Phil Zimmermann | http://www.nai.com |
| PowerPGP | http://home.rochester.rr.com/powerpgp |
| WPGP | http://www.panix.com/~jgostl/wpgp |
| CryptoEx von Glück & Kanja | http://www.glueckkanja.de |
| The International PGP Home Page von Ståle Schumacher | http://www.pgpi.com |
| Deutsche PGP-Seite | http://pgp.de |
| PGP.Net | http://www.de.pgp.net |
| PGP bei c't | http://www.heise.de/pgpCA |
| Individual Network e.V. | http://www.in-ca.individual.net |
| MAZ Trustcenter (TC) | http://www.trustcenter.de |
| Web.de TrustCenter | http://trust.web.de |
| S/MIME von RSA | http://www.rsa.com/smime |
| OpenPGP | http://www.ietf.org/html.charters/openpgp-charter.html |
| MailTrusT von TeleTrusT | http://www.teletrust.de |
| SSL (Secure Sockets Layer) von Netscape | http://home.netscape.com/products/security |
| VeriSign | http://www.verisign.com |
| DFN-PCA (Policy Certification Authority des DFN) | http://www.cert.dfn.de/dfnpca |
| Baltimore Technologies | http://www.baltimore.ie |
| Belsign | http://www.belsign.be |
| Thawte Consulting | http://www.thawte.com |
| Valicert | http://www.valicert.com |
| C2Net | https://www.c2.net |
| 13.6 Firewall | |
| BSI (Bundesamt für Sicherheit in der Informationstechnik) | http://www.bsi.bund.de |
| KryptoWall der KryptoKom | http://www.kryptokom.de |
| ICSA (International Computer Security Association) | http://www.icsa.net |
| IDI Intrusion Detection / Security Dynamics | http://www.intrusion.com, http://www.securid.com |
| ISS Internet Security Systems | http://www.iss.net |
| Check Point FireWall-1 | http://www.checkpoint.com |
| Raptor Eagle von Axent Technologies Inc. | http://www.axent.com |
| BorderWare Firewall Server von Secure Computing Corp. | http://www.securecomputing.com |
| Firewall 97 von AltaVista | http://www.altavista.software.digital.com |
| BIGfire von Biodata | http://www.biodata.de |
| Norman Firewall von Norman Data Defense Systems GmbH | http://www.norman.de |
| Gauntlet Internet Firewall von TIS Trust Information Systems / Network Associates | http://www.tis.com, http://www.nai.com |
| Great Circle Associates Inc. | http://www.greatcircle.com |
| CERT Coordination Center | http://www.cert.org |
| DFN-CERT | http://www.cert.dfn.de, http://www.fwl.dfn.de |
| COAST | http://www.cs.purdue.edu/coast/firewalls |
| 13.7 Sicherheitslücken in Web-Browsern und Betriebssystemen | |
| c't Nachrichtenticker | http://www.heise.de/newsticker/ |
| Hacker's best friend von UTECH | http://www.uvg.de |
| Schweizer Group 42 | http://www.swiss.net/group42 |
| Hacked.Net | http://www.hacked.net |
| NMRC Nomad Mobile Research Centre | http://www.nmrc.org |
| L0pht Heavy Industries | http://l0pht.com/hotnews.html |
| McLain | http://www.halcyon.com/mclain/ActiveX |
| Tea Vui Huang | http://www.scv.com.sg/~entea/security/reggap.htm |
| Spangler | http://www.ee.washington.edu/computing/iebug, http://www.security.org.il/msnetbreak, http://www.efsl.com/security/ntie |
| Cyber-Snot-Bug | http://www.cybersnot.com |
| Rioux und Macinta | http://web.mit.edu/crioux/www/ie/index.html |
| Mesander | http://neurosis.hungry.com/~ben/msie_bug |
| Java-DNS-Bug | http://www.sky.net/~williams/java/javasec.html |
| infinit information | http://hacke.infinit.se |
| Novell-RCGI-Bug | http://www.dunkel.de/security |
| Ross, Cheng, Kobin | http://www.v.nu/core |
| Trojanische Pferde bei ICSA | http://www.icsa.net |
| Back Orifice (BO) von Cult of the Dead Cow (cDc) | http://www.cultdeadcow.com |
| NetBus von Neikter | http://www.angelfire.com/ab/netbussite/index.html |
| Hasting | http://www.pchell.com |
| Dawson | http://www.tbtf.com/resource/iss-backdoor.txt |
| Shockwave-Bug | http://www.webcomics.com/shockwave |
| Security Config Wizard NT von Schmal/Sprejz | http://www-rnks.informatik.tu-cottbus.de/~fsch/deutsch/cfgwiz.htm |
| RegEdit von Clausen | http://www.regedit.com |
| Regmon von Russinovich/Cogswell | http://www.sysinternals.com/regmon.htm |
| AtGuard von WRQ Inc. | http://www.atguard.com |
| Heimann | http://www.it-sec.de |
| ISS Internet Security Systems Inc. | http://www.iss.net/xforce |
| Fyodor Exploit World | http://users.dhp.com/~fyodor/sploits.html |
| m.b. new order | http://neworder.box.sk |
| Trojan Horse Construction Kit | http://members.tripod.com/~THCK |
|
Weiter zu nächsten Kapiteln |
|
|
Zurück zur Inhaltsübersicht © 1999-2005 Torsten Horn, Aachen |
|