Firewalls: jumpstart for network and systems administrators
โ Scribed by John R Vacca; Scott Ellis
- Publisher
- Elsevier Digital
- Year
- 2005
- Tongue
- English
- Leaves
- 396
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and Read more...
โฆ Table of Contents
Content: Firewalls: what are they? --
Type of firewall security policy --
Firewall types --
Choosing the right firewall --
Defense in depth: firewall topologies --
Installation preparation --
Firewall configuration --
Simple policy implementation --
Complex web services management --
Content filtering --
Publicly accessible servers implementation --
Architecture selection --
External servers protection --
Internal IP security threats: Beyond the firewall --
Network address translation deployment --
Privacy and authentication technology --
Tunneling: firewall-to-firewall --
Auditing and logging --
Firewall administration.
Abstract:
๐ SIMILAR VOLUMES
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will lear
Microsoft .NET is born out of a personal search for the Holy Grail of .NET for IT professionals. Unlike competing texts, it focuses on actual implementation and management issues critical to the success of an enterprise. Through Nigel Stanley's active consulting practice, he has gathered essential i
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the
Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the la
<b> Stop waiting for the network team!ย </b><div><br><div></div><div>If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network--once they know how to unlock it.ย </div><div></div><div></div><div></div><div></div><div