Firewalls jumpstart for network and systems administrators /

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will...

Πλήρης περιγραφή

Κύριος συγγραφέας: Vacca, John R.
Άλλοι συγγραφείς: Ellis, Scott 1968-
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Amsterdam ; Boston : Elsevier Digital, c2005.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781555582975
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 03360nam a2200313 a 4500
001 1/44834
008 140702s2005 ne 001 0 eng
020 |a 9781555582975 
020 |a 1555582974 
020 |a 0080491324 (electronic bk.) 
020 |a 9780080491325 (electronic bk.) 
035 |l 47788 
040 |a OPELS  |b eng  |c OPELS  |d OKU  |d OCLCQ  |d NTG  |d MERUC  |d UBY  |d E7B  |d U5D  |d IDEBK  |d B24X7  |d DEBBG  |d N$T  |d YDXCP  |d OCLCQ  |d OCLCF  |d GR-PeUP 
100 1 |a Vacca, John R. 
245 1 0 |a Firewalls  |h [electronic resource] :  |b jumpstart for network and systems administrators /  |c John R. Vacca, Scott Ellis. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier Digital,  |c c2005. 
300 |a 1 online resource (xxx, 418 p.) :  |b ill. 
504 |a Includes bibliographical references and index. 
505 0 |a Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration. 
520 |a In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures. 
650 4 |a Firewalls (Computer security) 
655 4 |a Electronic books. 
700 1 |a Ellis, Scott  |q (Scott Raymond),  |d 1968- 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140702  |p 00b47788  |q 00b47788  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781555582975 
856 4 |d /webopac/covers/03/47788_9781555582975.jpg 
856 4 |d /webopac/covers/03/47788_1555582974.jpg 
856 4 |d /webopac/covers/03/47788_0080491324.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/03/47788_9780080491325.jpg  |z (electronic bk.)