Firewall policies and VPN configurations:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2006
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t |
Beschreibung: | 1 Online-Ressource (xxii, 482 p.) |
ISBN: | 0080506518 1281078344 1429415908 1597490881 9780080506517 9781281078346 9781429415903 9781597490887 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044139 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080506518 |9 0-08-050651-8 | ||
020 | |a 1281078344 |9 1-281-07834-4 | ||
020 | |a 1429415908 |c electronic bk. |9 1-4294-1590-8 | ||
020 | |a 1597490881 |9 1-59749-088-1 | ||
020 | |a 9780080506517 |9 978-0-08-050651-7 | ||
020 | |a 9780080506517 |9 978-0-08-050651-7 | ||
020 | |a 9781281078346 |9 978-1-281-07834-6 | ||
020 | |a 9781429415903 |c electronic bk. |9 978-1-4294-1590-3 | ||
020 | |a 9781597490887 |9 978-1-59749-088-7 | ||
035 | |a (OCoLC)560282086 | ||
035 | |a (DE-599)BVBBV043044139 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Firewall policies and VPN configurations |c Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
264 | 1 | |a Rockland, MA |b Syngress |c c2006 | |
300 | |a 1 Online-Ressource (xxii, 482 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index | ||
500 | |a This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Firewalls (Computer security) |2 local | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Firewalls (Computer security) | |
700 | 1 | |a Henmi, Anne |e Sonstige |4 oth | |
700 | 1 | |a Lucas, Mark |e Sonstige |4 oth | |
700 | 1 | |a Singh, Abhishek |e Sonstige |4 oth | |
700 | 1 | |a Cantrell, Chris |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028468676 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175409610227712 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043044139 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)560282086 (DE-599)BVBBV043044139 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03398nmm a2200589zc 4500</leader><controlfield tag="001">BV043044139</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080506518</subfield><subfield code="9">0-08-050651-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281078344</subfield><subfield code="9">1-281-07834-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429415908</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-1590-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490881</subfield><subfield code="9">1-59749-088-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080506517</subfield><subfield code="9">978-0-08-050651-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080506517</subfield><subfield code="9">978-0-08-050651-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281078346</subfield><subfield code="9">978-1-281-07834-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429415903</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-1590-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490887</subfield><subfield code="9">978-1-59749-088-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560282086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044139</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Firewall policies and VPN configurations</subfield><subfield code="c">Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 482 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Henmi, Anne</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lucas, Mark</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Abhishek</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cantrell, Chris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028468676</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044139 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:50Z |
institution | BVB |
isbn | 0080506518 1281078344 1429415908 1597490881 9780080506517 9781281078346 9781429415903 9781597490887 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028468676 |
oclc_num | 560282086 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 482 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Firewall policies and VPN configurations Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell Rockland, MA Syngress c2006 1 Online-Ressource (xxii, 482 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures local Firewalls (Computer security) local Computer networks / Security measures fast Firewalls (Computer security) fast Computer networks Security measures Firewalls (Computer security) Henmi, Anne Sonstige oth Lucas, Mark Sonstige oth Singh, Abhishek Sonstige oth Cantrell, Chris Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636 Aggregator Volltext |
spellingShingle | Firewall policies and VPN configurations COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures local Firewalls (Computer security) local Computer networks / Security measures fast Firewalls (Computer security) fast Computer networks Security measures Firewalls (Computer security) |
title | Firewall policies and VPN configurations |
title_auth | Firewall policies and VPN configurations |
title_exact_search | Firewall policies and VPN configurations |
title_full | Firewall policies and VPN configurations Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
title_fullStr | Firewall policies and VPN configurations Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
title_full_unstemmed | Firewall policies and VPN configurations Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
title_short | Firewall policies and VPN configurations |
title_sort | firewall policies and vpn configurations |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures local Firewalls (Computer security) local Computer networks / Security measures fast Firewalls (Computer security) fast Computer networks Security measures Firewalls (Computer security) |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Firewalls (Computer security) Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170636 |
work_keys_str_mv | AT henmianne firewallpoliciesandvpnconfigurations AT lucasmark firewallpoliciesandvpnconfigurations AT singhabhishek firewallpoliciesandvpnconfigurations AT cantrellchris firewallpoliciesandvpnconfigurations |