Securepoint Literature

This section contains some books that deal with Securepoint products and network security.

Einführung in Unified Threat Management (UTM)

Einführung in Unified Threat Management (UTM)Short description:
UTM systems provide contemporary and comprehensive support for all security problems in the network because they combine different protection mechanisms on one platform. A UTM-Gateway ensures security for the entire network and its users from one central point; this applies not only to LAN, but to mobile employees and remote access to company applications, too.

Starting with the basics of network technology, current threat scenarios and legal foundations, right up to the comprehensive IT security, author Klaus Dembowski ensures that nothing has been left out. The large number of real-life references provide numerous solution proposals and give the book a certain workshop character based on Securepoint and TERRA-UTM systems. The book is a very handy reference text for both beginners and experts alike. It shows how UTM systems are set up, configured and implemented for optimum use in companies. The 431 pages deal with Unified Threat Management extensively and in great detail.

From the contents:

  • IT security, threat scenarios and data protection
  • Network basics
  • Setup and implementation of UTM systems
  • Creation of firewall rules
  • Authentication with RADIUS and certificates
  • Secure connection with IPSec, SSL-VPN, L2TP and VPNs
  • Interfaces and routing for LAN, WLAN and WAN
  • Configuring users, services, spam/content filters and proxies

The book “Einführung in Unified Threat Management (UTM)” can be purchased in bookshops and on Amazon for 39.95 euros.

Qualified engineer, Klaus Dembowski is a member of the scientific staff working for the Institute of Microsystems Technology at the Hamburg University of Technology. He has written a number of successful books on the topic of computer and network technology.

The following PDF contains an extract from the book: Einführung in Unified Threat Management (UTM), Chapter 5


Book premiere "Lokale Netze, Handbuch der kompletten Netzwerktechnik" by publisher Addison-Wesley with the Securepoint UTM Firewall

Lokale Netze, Handbuch der kompletten NetzwerktechnikShort description:
Starting with the basics of network technology such as hardware, protocols and standards, right up to networks and various operating systems, author Klaus Dembowski ensures that nothing has been left out. The large number of real-life references, both under Windows Server 2003 and Linux, provide numerous solution proposals and give the book a certain workshop character. It is a very handy reference text for both beginners and experts alike. The final chapter about security measures, including a do-it-yourself construction of the Securepoint UTM Firewall, is the crowning glory of the book. This firewall has been tested extensively by the author. This book contains a test version of the required software in the form of a CD and this enables you to get started immediately with your Securepoint UTM Firewall.

The following PDF contains an extract from the book: Lokale Netze, Chapter 16

Intrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks

Intrusion Detection System Evasion durch Angriffsverschleierung in Exploiting FrameworksShort description:
You can ensure that your IT systems receive increased protection by implementing security measures such as firewalls, intrusion detection systems or intrusion prevention systems (IDS/IPS) which aim to block certain data traffic or detect and prevent attacks. An example of an attack would be a malicious user using an exploit to take advantage of a security vulnerability with the intention of executing his or her own code and gaining control over the IT system. Exploiting frameworks represent a type of construction kit for such attacks that an attacker can use to adjust the exploit and execute it automatically against the target system. However, many attacks are detected by protection measures such as IDS or fended off by intrusion prevention systems (IPS) as the case may be. To prevent such attacks from detection, several combinable techniques exist that can be applied to various layers of the ISO OSI model to circumvent the IDS/IPS mechanisms that detect attacks. In some Exploiting Frameworks, such as the Metasploit Framework (MSF), SAINT Exploit or Core Impact, some techniques for attack deception have already been implemented. This poses a threat to companies because successful attacks on IT systems can no longer be detected by IDS in this case. This book analyses and evaluates techniques and concepts that are used to shape attacks in such a way that they cannot be detected by IDS/IPS (insertion, evasion and obfuscation). By integrating these techniques into Exploiting Frameworks, the contribution of Exploiting Frameworks is also examined from the perspective of techniques for attack deception. Several selected NIDS are evaluated from the perspective of techniques for attack deception. For this purpose, the fundamentals of Exploiting Frameworks, IDS/IPS and techniques for attack deception are presented and a test environment and test scenarios are created, in which the tests are carried out using the example of the Metasploit Exploiting Framework and several Network Intrusion Detection Systems (NIDS). Snort, among others, is implemented as a NIDS.


Einführung von IP-Telefonie (Voice over IP) in einem mittelständischen Unternehmen

Google Books

WLAN-Implementierung und Integration eines Accesspoints unter besonderer Berücksichtigung von Verbindungsabbrüchen

Google Books

Deploying License-Free Wireless Wide-Area Networks

Deploying License-Free Wireless Wide-Area NetworksShort description:
It's ten o'clock—do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be eavesdropping on your e-mail, plucking your passwords out of the air, or sending spam through your Internet connection right now! When you're using a wireless network—whether a Macintosh with AirPort gear or Windows with any Wi-Fi equipment—you're exposed to risk unless you take steps.


Secrets of Computer Espionage: Tactics and Countermeasures

Secrets of Computer EspionageThis book contains a description of the Securepoint IDS system for Windows. This system was discontinued by Securepoint a few years ago and you now find the Securepoint IDS in every Securepoint UTM solution.

Short description:
Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government
Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals
Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes
Companion Web site contains links to security tools and useful security information resources