Building DMZs for Enterprise networks
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In su...
Άλλοι συγγραφείς: | Shimonski, Robert. |
---|---|
Μορφή: | Ηλεκτρονική πηγή |
Γλώσσα: | English |
Στοιχεία έκδοσης: |
Rockland, Mass. :
Syngress Pub.,
c2003.
|
Θέματα: | |
Διαθέσιμο Online: |
http://www.sciencedirect.com/science/book/9781931836883 |
Ετικέτες: |
Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
|
LEADER | 02130nam a2200277 a 4500 | ||
---|---|---|---|
001 | 1/44651 | ||
008 | 140624s2003 us 001 0 eng | ||
020 | |a 9781931836883 | ||
020 | |a 1931836884 | ||
035 | |l 47605 | ||
040 | |a OPELS |b eng |c OPELS |d OCLCQ |d B24X7 |d OCLCQ |d OCLCF |d GR-PeUP | ||
245 | 0 | 0 | |a Building DMZs for Enterprise networks |h [electronic resource] / |c Robert J. Shimonski ... [et al.]. |
246 | 3 | |a DMZs for Enterprise networks | |
260 | |a Rockland, Mass. : |b Syngress Pub., |c c2003. | ||
300 | |a 1 online resource (xxxvii, 744 p.) : |b ill. | ||
520 | |a This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no books written specifically on DMZs - This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances. - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book. | ||
500 | |a Includes index. | ||
650 | 4 | |a Computer networks |x Access control. | |
650 | 4 | |a Computer networks |x Security measures. | |
650 | 4 | |a Wide area networks (Computer networks) |x Access. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Shimonski, Robert. | |
852 | |a INST |b UNIPILB |c EBOOKS |e 20140624 |p 00b47605 |q 00b47605 |t ONLINE |y 0 | ||
856 | 4 | 0 | |3 ScienceDirect |u http://www.sciencedirect.com/science/book/9781931836883 |
856 | 4 | |d /webopac/covers/03/47605_9781931836883.jpg | |
856 | 4 | |d /webopac/covers/03/47605_1931836884.jpg |