Cargando…

Designing and building enterprise DMZs /

This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Dubrawsky, Ido, Baumrucker, C. Tate
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocm76962323
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 061213s2006 maua o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCO  |d NLGGC  |d OPELS  |d COO  |d ZCU  |d B24X7  |d MERUC  |d EBLCP  |d DEBSZ  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d U3W  |d STF  |d D6H  |d VTS  |d ICG  |d INT  |d VT2  |d AU@  |d OCLCQ  |d JBG  |d TKN  |d OCLCQ  |d LEAUB  |d DKC  |d OCLCQ  |d M8D  |d INARC  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ 
019 |a 144222809  |a 162597526  |a 181421143  |a 183266440  |a 507020846  |a 856952346  |a 1058172933 
020 |a 1429415916  |q (electronic bk.) 
020 |a 9781429415910  |q (electronic bk.) 
020 |a 9781597491006 
020 |a 1597491004 
020 |a 0080504000 
020 |a 9780080504001 
024 1 |a 792502910047 
029 1 |a AU@  |b 000051860803 
029 1 |a AU@  |b 000053225599 
029 1 |a CHBIS  |b 005829060 
029 1 |a CHNEW  |b 001004953 
029 1 |a CHVBK  |b 168469413 
029 1 |a DEBBG  |b BV042314140 
029 1 |a DEBBG  |b BV042959269 
029 1 |a DEBBG  |b BV044127638 
029 1 |a DEBSZ  |b 405313365 
029 1 |a DEBSZ  |b 422248509 
029 1 |a DEBSZ  |b 43044429X 
029 1 |a GBVCP  |b 799411647 
029 1 |a NZ1  |b 11778600 
029 1 |a NZ1  |b 15189271 
029 1 |a YDXCP  |b 2500040 
029 1 |a DKDLA  |b 820120-katalog:999890970905765 
035 |a (OCoLC)76962323  |z (OCoLC)144222809  |z (OCoLC)162597526  |z (OCoLC)181421143  |z (OCoLC)183266440  |z (OCoLC)507020846  |z (OCoLC)856952346  |z (OCoLC)1058172933 
037 |a 135467:135602  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .D47 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Designing and building enterprise DMZs /  |c technical editor, Ido Dubrawsky ; authors, C. Tate Baumrucker [and others]. 
246 3 |a Designing and building enterprise demilitarized zones 
260 |a Rockland, MA :  |b Syngress,  |c ©2006. 
300 |a 1 online resource (xxii, 714 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a 1: DMZ Concepts, Layout and Conceptual Design -- 2: Windows 2000 DMZ Design -- 3: Solaris DMZ Design -- 4: Wireless DMZs (WDMZs) -- 5: Firewall Design: Cisco PIX -- 6: Firewall and DMZ Design: Checkpoint NG -- 7: Firewall and DMZ Design: Nokia Firewall -- 8: Firewall and DMZ Design: ISA Server 2000 -- 9: DMZ Router and Switch Security -- 10: DMZ Based VPN Services -- 11: Wireless DMZ Implementation -- 12: Sun Solaris Bastion Hosts -- 13: Windows 2000 Bastion Hosts -- 14: Hacking the DMZ -- 15: Intrusion Detection in the DMZ. 
520 |a This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Business enterprises  |x Computer networks. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Entreprises  |x Réseaux d'ordinateurs. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Business enterprises  |x Computer networks.  |2 blmlsh 
650 7 |a Business enterprises  |x Computer networks.  |2 fast  |0 (OCoLC)fst00842531 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Dubrawsky, Ido. 
700 1 |a Baumrucker, C. Tate. 
776 0 8 |i Print version:  |t Designing and building enterprise DMZs.  |d Rockland, MA : Syngress, ©2006  |z 1597491004  |w (OCoLC)74735721 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=170637  |z Texto completo 
938 |a Internet Archive  |b INAR  |n designingbuildin0000unse_n5g8 
938 |a Books 24x7  |b B247  |n bks00016128 
938 |a EBL - Ebook Library  |b EBLB  |n EBL272101 
938 |a EBSCOhost  |b EBSC  |n 170637 
938 |a YBP Library Services  |b YANK  |n 2500040 
938 |a YBP Library Services  |b YANK  |n 2627199 
938 |a YBP Library Services  |b YANK  |n 2730648 
994 |a 92  |b IZTAP