|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn896854761 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
141113s2014 enka o 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d OCLCQ
|d COCUF
|d K6U
|d CNNOR
|d CCO
|d PIFAG
|d FVL
|d N$T
|d UMI
|d DEBBG
|d YDXCP
|d DEBSZ
|d OCLCF
|d IDEBK
|d EBLCP
|d S4S
|d COO
|d REB
|d FEM
|d OCLCQ
|d ZCU
|d AGLDB
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d D6H
|d OCL
|d STF
|d VTS
|d ICG
|d INT
|d VT2
|d OCLCQ
|d G3B
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d HS0
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 894628929
|a 896723266
|a 907296568
|a 968113865
|a 969002160
|
020 |
|
|
|a 9781849517737
|q (e-book)
|
020 |
|
|
|a 1849517738
|q (e-book)
|
020 |
|
|
|a 184951772X
|
020 |
|
|
|a 9781849517720
|
020 |
|
|
|a 1322242631
|
020 |
|
|
|a 9781322242637
|
020 |
|
|
|z 9781849517720
|
029 |
1 |
|
|a AU@
|b 000059333301
|
029 |
1 |
|
|a AU@
|b 000067103385
|
029 |
1 |
|
|a DEBBG
|b BV042490243
|
029 |
1 |
|
|a DEBBG
|b BV043613380
|
029 |
1 |
|
|a DEBSZ
|b 422920673
|
029 |
1 |
|
|a DEBSZ
|b 434834238
|
029 |
1 |
|
|a DEBSZ
|b 493154310
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999935729805765
|
029 |
1 |
|
|a GBVCP
|b 802479286
|
035 |
|
|
|a (OCoLC)896854761
|z (OCoLC)894628929
|z (OCoLC)896723266
|z (OCoLC)907296568
|z (OCoLC)968113865
|z (OCoLC)969002160
|
037 |
|
|
|a CL0500000504
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .E43 2014eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a El-Bawab, Abd El-Monem A.,
|e author.
|
245 |
1 |
0 |
|a Untangle network security :
|b secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
|c Abd El-Monem A. El-Bawab.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing,
|c 2014.
|
300 |
|
|
|a 1 online resource (351 pages) :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a Community experience distilled
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed November 13, 2014).
|
500 |
|
|
|a Includes index.
|
520 |
8 |
|
|a Annotation
|b If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Untangle; Introducing Untangle, Inc.; An overview on information security; The CIA triad; Types of attacks; Types of controls; Defense in depth; Introducing Untangle NGFW; Untangle NGFW modules; Untangle packages; Licensing Untangle; Reviewing the change log; Summary; Chapter 2: Installing Untangle; Understanding the hardware requirements of Untangle NGFW; Untangle NGFW appliances; Building your Untangle NGFW box; Virtualizing your Untangle NGFW
|
505 |
8 |
|
|a Tweaking your Untangle NGFWSetting up your lab; Getting Untangle; Writing your image; Untangle NGFW installation guide; Step 1 -- booting and selecting the installation mode; Step 2 -- selecting the installation wizard language; Step 3 -- configuring the system locale; Step 4 -- configuring the keymaps; Step 5 -- configuring the server time zone; Step 6 -- reviewing the hardware rating summary; Step 7 -- preparing the hard disk; Step 8 -- completing the installation; Summary; Chapter 3: The Initial Configuration of Untangle ; Understanding the boot options; The initial configuration wizard
|
505 |
8 |
|
|a Step 1 -- selecting the wizard languageStep 2 -- setting the admin password and server time zone; Step 3 -- mapping the network cards; Step 4 -- configuring the Internet connection; Acquiring automatic configurations from DHCP; Manually configuring the interface settings; Step 5 -- configuring the Untangle NGFW operation mode; Understanding the router operation mode; Understanding the transparent bridge operation mode; Step 6 -- configuring the automatic upgrade settings; Step 7 -- finishing the initial configuration wizard; Registering your server; Reviewing the GUI
|
505 |
8 |
|
|a Untangle NGFW administration optionsSummary; Chapter 4: Untangle Advanced Configuration; Untangle placement options; Understanding the architecture of Untangle NGFW; Managing Untangle NGFW interfaces; Common uses of additional interfaces; Configuring Untangle NGFW interfaces; Addressed interfaces; Bridged interfaces; VLANS; Configuring Untangle NGFW high availability; Configuring the Untangle NGFW hostname; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle NGFW DNS service; Untangle NGFW DHCP service; DNS and DHCP advanced options
|
505 |
8 |
|
|a Configuring advanced network optionsUnderstanding Untangle NGFW rules; Port forward rules; NAT rules; Bypass rules; QoS rules; The seven priorities; Configuring the QoS settings; Configuring the QoS rules; Reviewing the QoS status; Filter rules; Troubleshooting; Summary; Chapter 5: Advanced Administration Settings; Configuring the administration settings; Managing the administrator accounts; Configuring the remote administration settings; Configuring the public address of Untangle NGFW; Configuring the regional settings; Configuring Untangle NGFW processing of protocols
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Security measures.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
6 |
|a Sécurité informatique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|0 (OCoLC)fst00925719
|
776 |
0 |
8 |
|i Print version:
|n Druck-Ausgabe
|t El-Bawab, Abd El-Monem A. Untangle Network Security
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781849517720/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1831903
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10967762
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 883033
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis30035918
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12147652
|
994 |
|
|
|a 92
|b IZTAP
|