Cargando…

Firewall design and analysis /

This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-pron...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Liu, Alex X.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Singapore ; Hackensack, NJ : World Scientific, ©2011.
Colección:Computer and network security ; v. 4.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn742566319
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 110726s2011 si a ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d STF  |d YDXCP  |d OCLCQ  |d COO  |d UIU  |d OCLCQ  |d OCLCF  |d NLGGC  |d OCLCQ  |d VTS  |d LEAUB  |d EYM  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 889113256  |a 1086437568 
020 |a 9789814261661  |q (electronic bk.) 
020 |a 9814261661  |q (electronic bk.) 
020 |z 9789814261654 
020 |z 9814261653 
029 1 |a AU@  |b 000053271672 
029 1 |a DEBBG  |b BV043076649 
029 1 |a DEBSZ  |b 42158453X 
029 1 |a GBVCP  |b 803612176 
029 1 |a AU@  |b 000054182645 
035 |a (OCoLC)742566319  |z (OCoLC)889113256  |z (OCoLC)1086437568 
050 4 |a TK5105.59  |b .L57 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Liu, Alex X. 
245 1 0 |a Firewall design and analysis /  |c Alex X. Liu. 
260 |a Singapore ;  |a Hackensack, NJ :  |b World Scientific,  |c ©2011. 
300 |a 1 online resource (xi, 109 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Series in computer and network security ;  |v v. 4 
504 |a Includes bibliographical references (pages 105-108) and index. 
505 0 |a 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions. 
520 |a This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Firewalls (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Coupe-feu (Sécurité informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Firewalls (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Liu, Alex X.  |t Firewall design and analysis.  |d Singapore : World Scientific, ©2011  |z 9789814261654  |w (OCoLC)298781586 
830 0 |a Computer and network security ;  |v v. 4. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=374805  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 374805 
938 |a YBP Library Services  |b YANK  |n 6965033 
994 |a 92  |b IZTAP