|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn742566319 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110726s2011 si a ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d STF
|d YDXCP
|d OCLCQ
|d COO
|d UIU
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCQ
|d VTS
|d LEAUB
|d EYM
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 889113256
|a 1086437568
|
020 |
|
|
|a 9789814261661
|q (electronic bk.)
|
020 |
|
|
|a 9814261661
|q (electronic bk.)
|
020 |
|
|
|z 9789814261654
|
020 |
|
|
|z 9814261653
|
029 |
1 |
|
|a AU@
|b 000053271672
|
029 |
1 |
|
|a DEBBG
|b BV043076649
|
029 |
1 |
|
|a DEBSZ
|b 42158453X
|
029 |
1 |
|
|a GBVCP
|b 803612176
|
029 |
1 |
|
|a AU@
|b 000054182645
|
035 |
|
|
|a (OCoLC)742566319
|z (OCoLC)889113256
|z (OCoLC)1086437568
|
050 |
|
4 |
|a TK5105.59
|b .L57 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Liu, Alex X.
|
245 |
1 |
0 |
|a Firewall design and analysis /
|c Alex X. Liu.
|
260 |
|
|
|a Singapore ;
|a Hackensack, NJ :
|b World Scientific,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xi, 109 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Series in computer and network security ;
|v v. 4
|
504 |
|
|
|a Includes bibliographical references (pages 105-108) and index.
|
505 |
0 |
|
|a 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions.
|
520 |
|
|
|a This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Liu, Alex X.
|t Firewall design and analysis.
|d Singapore : World Scientific, ©2011
|z 9789814261654
|w (OCoLC)298781586
|
830 |
|
0 |
|a Computer and network security ;
|v v. 4.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=374805
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 374805
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 6965033
|
994 |
|
|
|a 92
|b IZTAP
|