Configuring IPCop firewalls: closing borders with Open Source
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, U.K.
Packt Pub.
c2006
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page Annotation Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- - Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- - Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites |
Beschreibung: | 1 Online-Ressource (vi, 228 p.) |
ISBN: | 1847190251 9781847190253 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043147251 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2006 |||| o||u| ||||||eng d | ||
020 | |a 1847190251 |c electronic bk. |9 1-84719-025-1 | ||
020 | |a 9781847190253 |c electronic bk. |9 978-1-84719-025-3 | ||
035 | |a (OCoLC)250538600 | ||
035 | |a (DE-599)BVBBV043147251 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Dempster, Barrie |e Verfasser |4 aut | |
245 | 1 | 0 | |a Configuring IPCop firewalls |b closing borders with Open Source |c Barrie Dempster, James Eaton-Lee |
264 | 1 | |a Birmingham, U.K. |b Packt Pub. |c c2006 | |
300 | |a 1 Online-Ressource (vi, 228 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page | ||
500 | |a Annotation | ||
500 | |a Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- | ||
500 | |a - Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- | ||
500 | |a - Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 7 | |a Open source software |2 fast | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Open source software | |
700 | 1 | |a Eaton-Lee, James |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028571442 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175602723323904 |
---|---|
any_adam_object | |
author | Dempster, Barrie |
author_facet | Dempster, Barrie |
author_role | aut |
author_sort | Dempster, Barrie |
author_variant | b d bd |
building | Verbundindex |
bvnumber | BV043147251 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)250538600 (DE-599)BVBBV043147251 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04988nmm a2200481zc 4500</leader><controlfield tag="001">BV043147251</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1847190251</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84719-025-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781847190253</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84719-025-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)250538600</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043147251</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dempster, Barrie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Configuring IPCop firewalls</subfield><subfield code="b">closing borders with Open Source</subfield><subfield code="c">Barrie Dempster, James Eaton-Lee</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, U.K.</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vi, 228 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eaton-Lee, James</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028571442</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043147251 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:54Z |
institution | BVB |
isbn | 1847190251 9781847190253 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028571442 |
oclc_num | 250538600 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (vi, 228 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Packt Pub. |
record_format | marc |
spelling | Dempster, Barrie Verfasser aut Configuring IPCop firewalls closing borders with Open Source Barrie Dempster, James Eaton-Lee Birmingham, U.K. Packt Pub. c2006 1 Online-Ressource (vi, 228 p.) txt rdacontent c rdamedia cr rdacarrier "How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page Annotation Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- - Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- - Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Firewalls (Computer security) fast Open source software fast Firewalls (Computer security) Open source software Eaton-Lee, James Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612 Aggregator Volltext |
spellingShingle | Dempster, Barrie Configuring IPCop firewalls closing borders with Open Source COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Firewalls (Computer security) fast Open source software fast Firewalls (Computer security) Open source software |
title | Configuring IPCop firewalls closing borders with Open Source |
title_auth | Configuring IPCop firewalls closing borders with Open Source |
title_exact_search | Configuring IPCop firewalls closing borders with Open Source |
title_full | Configuring IPCop firewalls closing borders with Open Source Barrie Dempster, James Eaton-Lee |
title_fullStr | Configuring IPCop firewalls closing borders with Open Source Barrie Dempster, James Eaton-Lee |
title_full_unstemmed | Configuring IPCop firewalls closing borders with Open Source Barrie Dempster, James Eaton-Lee |
title_short | Configuring IPCop firewalls |
title_sort | configuring ipcop firewalls closing borders with open source |
title_sub | closing borders with Open Source |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Firewalls (Computer security) fast Open source software fast Firewalls (Computer security) Open source software |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Firewalls (Computer security) Open source software |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=236612 |
work_keys_str_mv | AT dempsterbarrie configuringipcopfirewallsclosingborderswithopensource AT eatonleejames configuringipcopfirewallsclosingborderswithopensource |