๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Firewalls. Jumpstart for Network and Systems Administrators

โœ Scribed by John R. Vacca and Scott R. Ellis (Auth.)


Publisher
Digital Press
Year
2004
Tongue
English
Leaves
396
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Content:
Foreword, Pages xvii-xviii
- Introduction, Pages xix-xxviii
Acknowledgments, Pages xxix-xxx
1 - Firewalls: What Are They?, Pages 3-21
2 - Type of Firewall Security Policy, Pages 23-48
3 - Firewall Types, Pages 49-57
4 - Choosing the Right Firewall, Pages 61-91
5 - Defense in Depth: Firewall Topologies, Pages 93-110
6 - Installation Preparation, Pages 113-129
7 - Firewall Configuration, Pages 131-145
8 - Simple Policy Implementation, Pages 149-158
9 - Complex Web Services Management, Pages 159-173
10 - Content Filtering, Pages 175-184
11 - Publicly Accessible Servers Implementation, Pages 187-202
12 - Architecture selection, Pages 203-215
13 - External Servers Protection, Pages 217-228
14 - Internal IP Security Threats: Beyond The Firewall, Pages 231-248
15 - Network Address Translation Deployment, Pages 249-268
16 - Privacy and Authentication Technology, Pages 271-283
17 - Tunneling: Firewall-to-Firewall, Pages 285-295
18 - Auditing and Logging, Pages 299-309
19 - Firewall administration, Pages 311-327
20 - Summary, Conclusions, and Recommendations, Pages 329-340
A - Contributors of firewall software, Pages 343-348
B - Worldwide Survey of Firewall Products, Pages 349-351
C - Firewall Companies, Pages 353-355
D - Commercial Products or Consultants Who Sell or Service Firewalls, Pages 357-361
E - Establishing Your Organization's Security, Pages 363-365
F - Network Interconnections, Pages 367-369
G - Deterring Masqueraders and Ensuring Authenticity, Pages 371-379
H - Preventing Eavesdropping to Protect Your Privacy, Pages 381-384
I - Thwarting Counterfeiters and Forgers to Retain Integrity Through a Reverse Firewall, Pages 385-389
J - Avoiding Disruption of Service to Maintain Availability, Pages 391-392
K - Developing Your Firewall Security Policy, Pages 393-396
Glossary, Pages 397-406
Index, Pages 407-418


๐Ÿ“œ SIMILAR VOLUMES


Firewalls: jumpstart for network and sys
โœ John R Vacca; Scott Ellis ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Elsevier Digital ๐ŸŒ English

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will lear

Firewalls: Jumpstart for Network and Sys
โœ John R. Vacca; Scott Raymond Ellis ๐Ÿ“‚ Library ๐Ÿ› Digital Press ๐ŸŒ English

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will lear

Microsoft .NET: Jumpstart for Systems Ad
โœ Nigel Stanley ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Digital Press ๐ŸŒ English

Microsoft .NET is born out of a personal search for the Holy Grail of .NET for IT professionals. Unlike competing texts, it focuses on actual implementation and management issues critical to the success of an enterprise. Through Nigel Stanley's active consulting practice, he has gathered essential i

Internet Security: A Jumpstart for Syste
โœ Tim Speed ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐ŸŒ English

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the

Internet Security: A Jumpstart for Syste
โœ Tim Speed, Juanita Ellis ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Digital Press ๐ŸŒ English

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the la

Networking for Systems Administrators
โœ Michael W Lucas ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Tilted Windmill Press ๐ŸŒ English

<b> Stop waiting for the network team!ย </b><div><br><div></div><div>If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network--once they know how to unlock it.ย </div><div></div><div></div><div></div><div></div><div