Cargando…

Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: El-Bawab, Abd El-Monem A. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn896854761
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 141113s2014 enka o 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d OCLCQ  |d COCUF  |d K6U  |d CNNOR  |d CCO  |d PIFAG  |d FVL  |d N$T  |d UMI  |d DEBBG  |d YDXCP  |d DEBSZ  |d OCLCF  |d IDEBK  |d EBLCP  |d S4S  |d COO  |d REB  |d FEM  |d OCLCQ  |d ZCU  |d AGLDB  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d D6H  |d OCL  |d STF  |d VTS  |d ICG  |d INT  |d VT2  |d OCLCQ  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d HS0  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 894628929  |a 896723266  |a 907296568  |a 968113865  |a 969002160 
020 |a 9781849517737  |q (e-book) 
020 |a 1849517738  |q (e-book) 
020 |a 184951772X 
020 |a 9781849517720 
020 |a 1322242631 
020 |a 9781322242637 
020 |z 9781849517720 
029 1 |a AU@  |b 000059333301 
029 1 |a AU@  |b 000067103385 
029 1 |a DEBBG  |b BV042490243 
029 1 |a DEBBG  |b BV043613380 
029 1 |a DEBSZ  |b 422920673 
029 1 |a DEBSZ  |b 434834238 
029 1 |a DEBSZ  |b 493154310 
029 1 |a DKDLA  |b 820120-katalog:999935729805765 
029 1 |a GBVCP  |b 802479286 
035 |a (OCoLC)896854761  |z (OCoLC)894628929  |z (OCoLC)896723266  |z (OCoLC)907296568  |z (OCoLC)968113865  |z (OCoLC)969002160 
037 |a CL0500000504  |b Safari Books Online 
050 4 |a TK5105.59  |b .E43 2014eb 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a El-Bawab, Abd El-Monem A.,  |e author. 
245 1 0 |a Untangle network security :  |b secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /  |c Abd El-Monem A. El-Bawab. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2014. 
300 |a 1 online resource (351 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from PDF title page (ebrary, viewed November 13, 2014). 
500 |a Includes index. 
520 8 |a Annotation  |b If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW 
505 8 |a Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard 
505 8 |a Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI 
505 8 |a Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options 
505 8 |a Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Security measures. 
650 0 |a Firewalls (Computer security) 
650 6 |a Sécurité informatique  |x Sécurité  |x Mesures. 
650 6 |a Coupe-feu (Sécurité informatique) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Firewalls (Computer security)  |2 fast  |0 (OCoLC)fst00925719 
776 0 8 |i Print version:  |n Druck-Ausgabe  |t El-Bawab, Abd El-Monem A. Untangle Network Security 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=883033  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849517720/?ar  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1831903 
938 |a ebrary  |b EBRY  |n ebr10967762 
938 |a EBSCOhost  |b EBSC  |n 883033 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis30035918 
938 |a YBP Library Services  |b YANK  |n 12147652 
994 |a 92  |b IZTAP