ACRONYME
|
SIGNIFICATION
|
ACL
|
Access Control List
|
AH
|
Authentication Header
|
BDR
|
Backup Designated Router
|
BIND
|
Berkeley Internet Name Domain
|
CHAP
|
Challenge-Handshake Authentication Protocol
|
DMZ
|
Zone démilitarisée
|
DoS
|
Denial of Service
|
DR
|
Designated Router
|
DSS
|
Digital Signature Standard
|
EIT
|
Enterprise Integration Technologies
|
ESP
|
Encapsulating Security Payload
|
FTP
|
File Transfer Protocol
|
HTTPS
|
HTTP over SSL
|
IETF
|
Internet Engineering Task Force
|
IKE
|
Internet Key Exchange
|
IPS
|
Intrusion Prevention Systems
|
IPsec
|
IP Security Protocols
|
ISAKMP
|
Internet Security Association and Key Management Protocol
|
L2F
|
Layer Two Forwarding
|
L2TP
|
Layer Two Tunneling Protocol
|
LAC
|
L2TP Access Concentrator
|
LER
|
Label Edge Router
|
LKM
|
Loadable Kernel Module
|
LNS
|
L2TP Network Server
|
LSA
|
Link State Advertisement
|
LSP
|
Label Switch Path
|
LSR
|
Label Switch Router
|
LSR
|
Link State Request
|
LSU
|
Link State Update
|
MAC
|
Message Authentication Code
|
MANHUNT
|
IDS Réseau Symantec
|
MANTRAP
|
Pot de miel Symantec
|
MPLS
|
MultiProtocol Label Switching
|
NCPs
|
Network Control Protocols
|
NFS
|
Network File System mis au point par Sun Microsystem
|
OSPF
|
Open Shortest Path First
|
OTP
|
One Time Password
|
PAP
|
Password Authentication Protocol
|
PPP
|
Point-to-Point Protocol
|
PPTP
|
Point to Point Tunneling Protocol
|
PVC
|
Private Virtual Circuit
|
RADIUS
|
Remote Dial-In User Service
|
RPC
|
Remote Procedure Call
|
SA
|
Security Association
|
SAD
|
Security Association Database
|
SASL
|
Simple Authentification and Security Layer
|
SESA
|
Symantec Entreprise Security Architecture
|
S-HTTP
|
Secure HTTP
|
SNMP
|
Simple Network Management Protocol
|
SPD
|
Security Policy Database
|
SPF
|
Shortest Path First
|
SPI
|
Security Parameter Index
|
SSH
|
Secure SHell
|
SSL
|
Secured Socket Layer
|
SSO
|
Single Sign On
|
SVA
|
Symantec Vulnerability Assessment
|
TACACS+
|
Terminal Access Controller Access Control System
|
TFTP
|
Trivial File Transfer Protocol
|
TLS
|
Transport Layer Security
|
TOS
|
Type Of Service
|
VR
|
Virtual Router
|
VRF
|
VPN Routing and Forwarding
|
ICV
|
Intégrity Check Value
|
TITRE
|
AUTEURS
|
EDITEUR
|
CODE ISBN
|
Creating and Implementing Virtual Private Networks
|
Casey Wilson, Peter Doak
|
CORIOLIS
|
1-57610-430-3
|
Stratégie anti hackers
|
Ryan Russel
|
EYROLLES
|
2-212-09252-0
|
Halte au Hackers
|
Stuart McClure, Joel Scambray, George Kurtz
|
OSMAN/EYROLLES MULTIMEDIA
|
2-7464-0292-0
|
SSL and TLS : Designing and building secure systems
|
Eric Rescorda
|
ADDISON-WESLEY
|
0-201-61598-3
|
Firewalls : la sécurité sur Internet
|
D. Brent Chapman, Elisabeth D. Zwicky
|
O’REILLY
|
2-84177-018-4
|
Practical Guide for implementing secure Intranets and Extranets
|
Kaustubh M. Phaltankar
|
ARTECH HOUSE PUBLISHERS
|
0-89006-447-4
|
E-Commerce Security
|
Anup K. Ghosh
|
WILEY COMPUTER PUBLISHING
|
0-471-19223-6
|
Intrusion Detection
|
Rebecca Gurley Bace
|
MACMILLIAN TECHNICAL PUBLISHING
|
1-57870-185-6
|
La signature électronique : transactions et confiance sur
Internet
|
Arnaud Fausse
|
DUNOD
|
2-10005-294-2
|
LINUX System Security : The Administrator Guide to Open Source
Security Tools
|
Scott Mann, Ellen L. Mitchel
|
PRENTICE HALL
|
0-13-015807-0
|
SSL and TLS
|
Eric Rescorla
|
ADDISON-WESLEY
|
0-201-61598-3
|
L’Internet sécurisé
|
Eric Larcher
|
EYROLLES
|
2-212-09137-0
|
Maximum Security : A hacker’s guide to protecting your Internet
site and network
|
Anonymous
|
SAMS
|
0-672-31341-3
|
Maximum Linux Security : A hacker’s guide to protecting your
Linux server and workstation
|
Anonymous
|
SAMS
|
0-672-31670-6
|
Apache – Installation et mise en oeuvre
|
Ben Laurie et Peter Laurie
|
O’REILLY
|
2-84177-080-X
|
Langage C
|
Claude Delannoy
|
EYROLLES
|
2-212-11123-1
|
ETUDE DES
VULNERABILITES D’UN GRAND RéSEAU D’ENTREPRISE ET SOLUTIONS DE
SECURITE
- ANNEXES - - Capitaine Marc BOGET - - Gendarmerie Nationale – Mastère SIO - 2003 Version 3.7
|