Network security firewalls and VPNs
β Scribed by Stewart, James Michael
- Publisher
- Jones & Bartlett Learning
- Year
- 2014
- Tongue
- English
- Leaves
- 488
- Series
- Jones & Bartlett Learning Information Systems Security & Assurance Series.
- Edition
- 2nd ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Pt. One. Foundations of network security. Foundations of network security --
Firewall fundamentals --
VPN fundamentals --
Network security threats and issues --
Pt. Two. Technical overview of network security, firewalls, and VPNs. Network security implementation --
Network security management --
Exploring the depths of firewalls --
Firewall deployment considerations --
Firewall management and security concerns --
Using common firewalls --
VPN management --
VPN technologies --
Implementation, resources, and the future. Firewall implementation --
Real-world VPNs --
Perspectives, resources, and the future.
β¦ Subjects
Computer networks -- Safety measures;Cortafuegos (Seguridad informΓ‘tica);Firewalls (Computer security);Redes de ordenadores -- Medidas de seguridad
π SIMILAR VOLUMES
<span>PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Network Security, Firewalls, and VPNs provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization s network is connected to the public I
<I>Internet Firewalls and Network Security</I> succeeds precisely because of its restricted focus: half of this book is devoted to firewalls and packet filters. After a comprehensive introduction to the architecture and theory of firewalls, the guide documents several commercial and noncommercial pa
This book shows how computer security is implemented and the ways in which it can be side-stepped by trespassers.Details ways to catch hackers and limit their accessVital coverage provided for all Internet and private host sitesCD-ROM includes software from Black Hole allowing users to build their o
This book shows how computer security is implemented and the ways in which it can be side-stepped by trespassers. * Details ways to catch hackers and limit their access * Vital coverage provided for all Internet and private host sites * CD-ROM includes software from Black Hole allowing user
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-pron