Building DMZs for Enterprise networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2003
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Cover; Contents; Foreword; DMZ Concepts, Layout, and Conceptual Design; Windows 2000 DMZ Design; Sun Solaris DMZ Design; Wireless DMZs; Firewall Design: Cisco PIX; Firewall and DMZ Design: Check Point NG; Firewall and DMZ Design: Nokia Firewall; Firewall and DMZ Design: ISA Server 2000; DMZ Router and Switch Security; DMZ-Based VPN Services; Implementing Wireless DMZs; Sun Solaris Bastion Hosts; Windows 2000 Bastion Hosts; Hacking the DMZ; Intrusion Detection in the DMZ; Appendix A IIS Web Server Hardening; Index; Related Titles The demilitarized zone segment of the network is the section exposed to the public Internet and is the most difficult area on the network to create, and maintain both from an engineering standpoint and a security standpoint. In this book (the only one of its kind) readers will learn how to make DMZ's utilizing the IT world's best of breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks |
Beschreibung: | 1 Online-Ressource (xxxvii, 744 pages) |
ISBN: | 1931836884 1932266593 9781931836883 9781932266597 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043151169 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 1931836884 |9 1-931836-88-4 | ||
020 | |a 1932266593 |c electronic bk. |9 1-932266-59-3 | ||
020 | |a 9781931836883 |9 978-1-931836-88-3 | ||
020 | |a 9781932266597 |c electronic bk. |9 978-1-932266-59-7 | ||
035 | |a (OCoLC)52730370 | ||
035 | |a (DE-599)BVBBV043151169 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004.6 |2 21 | |
100 | 1 | |a Shimonski, Robert |e Verfasser |4 aut | |
245 | 1 | 0 | |a Building DMZs for Enterprise networks |c Robert J. Shimonski [and others] |
246 | 1 | 3 | |a DMZs for Enterprise networks |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2003 | |
300 | |a 1 Online-Ressource (xxxvii, 744 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Cover; Contents; Foreword; DMZ Concepts, Layout, and Conceptual Design; Windows 2000 DMZ Design; Sun Solaris DMZ Design; Wireless DMZs; Firewall Design: Cisco PIX; Firewall and DMZ Design: Check Point NG; Firewall and DMZ Design: Nokia Firewall; Firewall and DMZ Design: ISA Server 2000; DMZ Router and Switch Security; DMZ-Based VPN Services; Implementing Wireless DMZs; Sun Solaris Bastion Hosts; Windows 2000 Bastion Hosts; Hacking the DMZ; Intrusion Detection in the DMZ; Appendix A IIS Web Server Hardening; Index; Related Titles | ||
500 | |a The demilitarized zone segment of the network is the section exposed to the public Internet and is the most difficult area on the network to create, and maintain both from an engineering standpoint and a security standpoint. In this book (the only one of its kind) readers will learn how to make DMZ's utilizing the IT world's best of breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks | ||
650 | 7 | |a COMPUTERS / Networking / Vendor Specific |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Transmission Systems / General |2 bisacsh | |
650 | 7 | |a Computer networks / Access control |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Wide area networks (Computer networks) / Access |2 fast | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Wide area networks (Computer networks) |x Access | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028575360 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175610997637120 |
---|---|
any_adam_object | |
author | Shimonski, Robert |
author_facet | Shimonski, Robert |
author_role | aut |
author_sort | Shimonski, Robert |
author_variant | r s rs |
building | Verbundindex |
bvnumber | BV043151169 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)52730370 (DE-599)BVBBV043151169 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03127nmm a2200493zc 4500</leader><controlfield tag="001">BV043151169</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836884</subfield><subfield code="9">1-931836-88-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266593</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-59-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836883</subfield><subfield code="9">978-1-931836-88-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266597</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-59-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52730370</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043151169</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shimonski, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building DMZs for Enterprise networks</subfield><subfield code="c">Robert J. Shimonski [and others]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">DMZs for Enterprise networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxvii, 744 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; Foreword; DMZ Concepts, Layout, and Conceptual Design; Windows 2000 DMZ Design; Sun Solaris DMZ Design; Wireless DMZs; Firewall Design: Cisco PIX; Firewall and DMZ Design: Check Point NG; Firewall and DMZ Design: Nokia Firewall; Firewall and DMZ Design: ISA Server 2000; DMZ Router and Switch Security; DMZ-Based VPN Services; Implementing Wireless DMZs; Sun Solaris Bastion Hosts; Windows 2000 Bastion Hosts; Hacking the DMZ; Intrusion Detection in the DMZ; Appendix A IIS Web Server Hardening; Index; Related Titles</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The demilitarized zone segment of the network is the section exposed to the public Internet and is the most difficult area on the network to create, and maintain both from an engineering standpoint and a security standpoint. In this book (the only one of its kind) readers will learn how to make DMZ's utilizing the IT world's best of breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Vendor Specific</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Transmission Systems / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wide area networks (Computer networks) / Access</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wide area networks (Computer networks)</subfield><subfield code="x">Access</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028575360</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043151169 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:02Z |
institution | BVB |
isbn | 1931836884 1932266593 9781931836883 9781932266597 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028575360 |
oclc_num | 52730370 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxxvii, 744 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Shimonski, Robert Verfasser aut Building DMZs for Enterprise networks Robert J. Shimonski [and others] DMZs for Enterprise networks Rockland, MA Syngress Pub. ©2003 1 Online-Ressource (xxxvii, 744 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Cover; Contents; Foreword; DMZ Concepts, Layout, and Conceptual Design; Windows 2000 DMZ Design; Sun Solaris DMZ Design; Wireless DMZs; Firewall Design: Cisco PIX; Firewall and DMZ Design: Check Point NG; Firewall and DMZ Design: Nokia Firewall; Firewall and DMZ Design: ISA Server 2000; DMZ Router and Switch Security; DMZ-Based VPN Services; Implementing Wireless DMZs; Sun Solaris Bastion Hosts; Windows 2000 Bastion Hosts; Hacking the DMZ; Intrusion Detection in the DMZ; Appendix A IIS Web Server Hardening; Index; Related Titles The demilitarized zone segment of the network is the section exposed to the public Internet and is the most difficult area on the network to create, and maintain both from an engineering standpoint and a security standpoint. In this book (the only one of its kind) readers will learn how to make DMZ's utilizing the IT world's best of breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks COMPUTERS / Networking / Vendor Specific bisacsh COMPUTERS / Data Transmission Systems / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Wide area networks (Computer networks) / Access fast Computer networks Access control Computer networks Security measures Wide area networks (Computer networks) Access http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103 Aggregator Volltext |
spellingShingle | Shimonski, Robert Building DMZs for Enterprise networks COMPUTERS / Networking / Vendor Specific bisacsh COMPUTERS / Data Transmission Systems / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Wide area networks (Computer networks) / Access fast Computer networks Access control Computer networks Security measures Wide area networks (Computer networks) Access |
title | Building DMZs for Enterprise networks |
title_alt | DMZs for Enterprise networks |
title_auth | Building DMZs for Enterprise networks |
title_exact_search | Building DMZs for Enterprise networks |
title_full | Building DMZs for Enterprise networks Robert J. Shimonski [and others] |
title_fullStr | Building DMZs for Enterprise networks Robert J. Shimonski [and others] |
title_full_unstemmed | Building DMZs for Enterprise networks Robert J. Shimonski [and others] |
title_short | Building DMZs for Enterprise networks |
title_sort | building dmzs for enterprise networks |
topic | COMPUTERS / Networking / Vendor Specific bisacsh COMPUTERS / Data Transmission Systems / General bisacsh Computer networks / Access control fast Computer networks / Security measures fast Wide area networks (Computer networks) / Access fast Computer networks Access control Computer networks Security measures Wide area networks (Computer networks) Access |
topic_facet | COMPUTERS / Networking / Vendor Specific COMPUTERS / Data Transmission Systems / General Computer networks / Access control Computer networks / Security measures Wide area networks (Computer networks) / Access Computer networks Access control Computer networks Security measures Wide area networks (Computer networks) Access |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=86103 |
work_keys_str_mv | AT shimonskirobert buildingdmzsforenterprisenetworks AT shimonskirobert dmzsforenterprisenetworks |