Cargando…

The best damn firewall book period /

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Carasik, Anne H., Shinder, Thomas W.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, 2003.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocm53449605
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 031117s2003 maua o 000 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d EBLCP  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d OPELS  |d DEBSZ  |d OCLCQ  |d VVN  |d NTG  |d WPG  |d DKDLA  |d ZCU  |d MERUC  |d CCO  |d E7B  |d HNW  |d B24X7  |d OCLCQ  |d AZK  |d CNNOR  |d MOR  |d PIFBR  |d OCLCQ  |d WY@  |d U3W  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d OCLCQ  |d NRAMU  |d EZ9  |d ICG  |d INT  |d VT2  |d TOF  |d OCLCQ  |d COO  |d A6Q  |d OCLCQ  |d LEAUB  |d DKC  |d OCLCQ  |d CNTRU  |d OL$  |d UKCRE  |d EYM  |d UKAHL  |d OCLCO  |d OCLCQ  |d COA  |d AU@  |d BRX  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 54360256  |a 63118837  |a 162599019  |a 174131080  |a 488477187  |a 506890776  |a 559287696  |a 647269599  |a 722190076  |a 728010143  |a 751933388  |a 765142455  |a 961667669  |a 981451829  |a 981588225  |a 988537909  |a 991907350  |a 991983973  |a 1000416317  |a 1005641061  |a 1035714814  |a 1037551096  |a 1038679563  |a 1045512413  |a 1047577843  |a 1055372515  |a 1058055671  |a 1060195618  |a 1066987385  |a 1076313562  |a 1081265324  |a 1097346246  |a 1153462490  |a 1194826967  |a 1228547384  |a 1340069437  |a 1354630728 
020 |a 1928994938  |q (electronic bk.) 
020 |a 9781928994930  |q (electronic bk.) 
020 |a 9781931836906 
020 |a 1931836906 
020 |a 0080476066 
020 |a 9780080476063 
024 8 |a (WaSeSS)ssj0000110458 
029 1 |a AU@  |b 000053010598 
029 1 |a AU@  |b 000053223331 
029 1 |a CHBIS  |b 005830730 
029 1 |a CHNEW  |b 001004615 
029 1 |a CHVBK  |b 168425424 
029 1 |a DEBBG  |b BV042307343 
029 1 |a DEBBG  |b BV044124236 
029 1 |a DEBSZ  |b 405314221 
029 1 |a GBVCP  |b 801085071 
029 1 |a NZ1  |b 11924387 
029 1 |a NZ1  |b 12433759 
029 1 |a NZ1  |b 15190385 
029 1 |a AU@  |b 000068459007 
035 |a (OCoLC)53449605  |z (OCoLC)54360256  |z (OCoLC)63118837  |z (OCoLC)162599019  |z (OCoLC)174131080  |z (OCoLC)488477187  |z (OCoLC)506890776  |z (OCoLC)559287696  |z (OCoLC)647269599  |z (OCoLC)722190076  |z (OCoLC)728010143  |z (OCoLC)751933388  |z (OCoLC)765142455  |z (OCoLC)961667669  |z (OCoLC)981451829  |z (OCoLC)981588225  |z (OCoLC)988537909  |z (OCoLC)991907350  |z (OCoLC)991983973  |z (OCoLC)1000416317  |z (OCoLC)1005641061  |z (OCoLC)1035714814  |z (OCoLC)1037551096  |z (OCoLC)1038679563  |z (OCoLC)1045512413  |z (OCoLC)1047577843  |z (OCoLC)1055372515  |z (OCoLC)1058055671  |z (OCoLC)1060195618  |z (OCoLC)1066987385  |z (OCoLC)1076313562  |z (OCoLC)1081265324  |z (OCoLC)1097346246  |z (OCoLC)1153462490  |z (OCoLC)1194826967  |z (OCoLC)1228547384  |z (OCoLC)1340069437  |z (OCoLC)1354630728 
037 |a 101095:101128  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b B47 2003eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 4 |a The best damn firewall book period /  |c Anne Carasik-Henmi, technical editor ; Thomas W. Shinder [and others]. 
260 |a Rockland, Mass. :  |b Syngress,  |c 2003. 
300 |a 1 online resource (xxxiv, 1293 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Print version record. 
520 |a This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth. The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them? The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to itfrom erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book. - This book is all encompassing, covering general Firewall issues and protocols, as well as specific products. - Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource. - The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia. 
505 0 |a 1931836906.pdf; 1931836906.pdf; COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Firewalls (Computer security) 
650 6 |a Coupe-feu (Sécurité informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Firewalls (Computer security)  |2 fast 
700 1 |a Carasik, Anne H. 
700 1 |a Shinder, Thomas W. 
758 |i has work:  |a Best damn firewall book period (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGVWyj6MJbw76bpRDkRpCP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Best damn firewall book period.  |d Rockland, Mass. : Syngress, 2003  |z 1931836906  |w (OCoLC)51992821 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294396  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24681913 
938 |a Books 24x7  |b B247  |n bks00003328 
938 |a EBL - Ebook Library  |b EBLB  |n EBL175464 
938 |a EBSCOhost  |b EBSC  |n 99766 
938 |a YBP Library Services  |b YANK  |n 2361652 
938 |a YBP Library Services  |b YANK  |n 2711664 
994 |a 92  |b IZTAP