|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn162595020 |
003 |
OCoLC |
005 |
20231117015023.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
070806s2005 ne a ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OKU
|d OCLCQ
|d NTG
|d MERUC
|d UBY
|d E7B
|d U5D
|d IDEBK
|d B24X7
|d DEBBG
|d N$T
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d COO
|d AGLDB
|d LIV
|d OCLCQ
|d STF
|d D6H
|d OCLCQ
|d VTS
|d CEF
|d OCLCQ
|d LEAUB
|d M8D
|d VLY
|d VT2
|d INARC
|d OCLCQ
|d OCLCO
|d MHW
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 70967856
|a 156908158
|a 441785424
|a 505145793
|a 606031738
|a 648305545
|a 856961547
|a 1035653112
|a 1153027897
|a 1162019686
|a 1192339078
|a 1240512574
|
020 |
|
|
|a 9781555582975
|
020 |
|
|
|a 1555582974
|
020 |
|
|
|a 0080491324
|q (electronic bk.)
|
020 |
|
|
|a 9780080491325
|q (electronic bk.)
|
020 |
|
|
|a 1281007080
|
020 |
|
|
|a 9781281007087
|
020 |
|
|
|a 9786611007089
|
020 |
|
|
|a 6611007083
|
035 |
|
|
|a (OCoLC)162595020
|z (OCoLC)70967856
|z (OCoLC)156908158
|z (OCoLC)441785424
|z (OCoLC)505145793
|z (OCoLC)606031738
|z (OCoLC)648305545
|z (OCoLC)856961547
|z (OCoLC)1035653112
|z (OCoLC)1153027897
|z (OCoLC)1162019686
|z (OCoLC)1192339078
|z (OCoLC)1240512574
|
050 |
|
4 |
|a TK5105.59
|b .V32 2005eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Vacca, John R.
|
245 |
1 |
0 |
|a Firewalls :
|b jumpstart for network and systems administrators /
|c John R. Vacca, Scott Ellis.
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Elsevier Digital,
|c �2005.
|
300 |
|
|
|a 1 online resource (xxx, 418 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration.
|
520 |
|
|
|a In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
6 |
|a Coupe-feu (S�ecurit�e informatique)
|0 (CaQQLa)201-0344221
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|0 (OCoLC)fst00925719
|
700 |
1 |
|
|a Ellis, Scott
|q (Scott Raymond),
|d 1968-
|
776 |
0 |
8 |
|i Print version:
|a Vacca, John R.
|t Firewalls.
|d Amsterdam ; Boston : Elsevier Digital, �2005
|z 1555582974
|z 9781555582975
|w (DLC) 2004063211
|w (OCoLC)56942207
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781555582975
|z Texto completo
|