Cargando…

Firewalls : jumpstart for network and systems administrators /

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vacca, John R.
Otros Autores: Ellis, Scott (Scott Raymond), 1968-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier Digital, �2005.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn162595020
003 OCoLC
005 20231117015023.0
006 m o d
007 cr cn|||||||||
008 070806s2005 ne a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OKU  |d OCLCQ  |d NTG  |d MERUC  |d UBY  |d E7B  |d U5D  |d IDEBK  |d B24X7  |d DEBBG  |d N$T  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COO  |d AGLDB  |d LIV  |d OCLCQ  |d STF  |d D6H  |d OCLCQ  |d VTS  |d CEF  |d OCLCQ  |d LEAUB  |d M8D  |d VLY  |d VT2  |d INARC  |d OCLCQ  |d OCLCO  |d MHW  |d OCLCQ  |d OCLCO 
019 |a 70967856  |a 156908158  |a 441785424  |a 505145793  |a 606031738  |a 648305545  |a 856961547  |a 1035653112  |a 1153027897  |a 1162019686  |a 1192339078  |a 1240512574 
020 |a 9781555582975 
020 |a 1555582974 
020 |a 0080491324  |q (electronic bk.) 
020 |a 9780080491325  |q (electronic bk.) 
020 |a 1281007080 
020 |a 9781281007087 
020 |a 9786611007089 
020 |a 6611007083 
035 |a (OCoLC)162595020  |z (OCoLC)70967856  |z (OCoLC)156908158  |z (OCoLC)441785424  |z (OCoLC)505145793  |z (OCoLC)606031738  |z (OCoLC)648305545  |z (OCoLC)856961547  |z (OCoLC)1035653112  |z (OCoLC)1153027897  |z (OCoLC)1162019686  |z (OCoLC)1192339078  |z (OCoLC)1240512574 
050 4 |a TK5105.59  |b .V32 2005eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
100 1 |a Vacca, John R. 
245 1 0 |a Firewalls :  |b jumpstart for network and systems administrators /  |c John R. Vacca, Scott Ellis. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier Digital,  |c �2005. 
300 |a 1 online resource (xxx, 418 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration. 
520 |a In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures. 
588 0 |a Print version record. 
546 |a English. 
650 0 |a Firewalls (Computer security) 
650 6 |a Coupe-feu (S�ecurit�e informatique)  |0 (CaQQLa)201-0344221 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Firewalls (Computer security)  |2 fast  |0 (OCoLC)fst00925719 
700 1 |a Ellis, Scott  |q (Scott Raymond),  |d 1968- 
776 0 8 |i Print version:  |a Vacca, John R.  |t Firewalls.  |d Amsterdam ; Boston : Elsevier Digital, �2005  |z 1555582974  |z 9781555582975  |w (DLC) 2004063211  |w (OCoLC)56942207 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781555582975  |z Texto completo