Firewalls :: jumpstart for network and systems administrators /
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier Digital,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures. |
Beschreibung: | 1 online resource (xxx, 418 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781555582975 1555582974 0080491324 9780080491325 1281007080 9781281007087 9786611007089 6611007083 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162595020 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070806s2005 ne a ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OKU |d OCLCQ |d NTG |d MERUC |d UBY |d E7B |d U5D |d IDEBK |d B24X7 |d DEBBG |d N$T |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d COO |d AGLDB |d LIV |d OCLCQ |d STF |d D6H |d OCLCQ |d VTS |d CEF |d OCLCQ |d LEAUB |d M8D |d VLY |d VT2 |d INARC |d OCLCQ |d OCLCO |d MHW |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 70967856 |a 156908158 |a 441785424 |a 505145793 |a 606031738 |a 648305545 |a 856961547 |a 1035653112 |a 1153027897 |a 1162019686 |a 1192339078 |a 1240512574 | ||
020 | |a 9781555582975 | ||
020 | |a 1555582974 | ||
020 | |a 0080491324 |q (electronic bk.) | ||
020 | |a 9780080491325 |q (electronic bk.) | ||
020 | |a 1281007080 | ||
020 | |a 9781281007087 | ||
020 | |a 9786611007089 | ||
020 | |a 6611007083 | ||
035 | |a (OCoLC)162595020 |z (OCoLC)70967856 |z (OCoLC)156908158 |z (OCoLC)441785424 |z (OCoLC)505145793 |z (OCoLC)606031738 |z (OCoLC)648305545 |z (OCoLC)856961547 |z (OCoLC)1035653112 |z (OCoLC)1153027897 |z (OCoLC)1162019686 |z (OCoLC)1192339078 |z (OCoLC)1240512574 | ||
037 | |a 98321:98323 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .V32 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Vacca, John R. |1 https://id.oclc.org/worldcat/entity/E39PCjtrrkDRw6CFBKw6vY94FX |0 http://id.loc.gov/authorities/names/n91039772 | |
245 | 1 | 0 | |a Firewalls : |b jumpstart for network and systems administrators / |c John R. Vacca, Scott Ellis. |
260 | |a Amsterdam ; |a Boston : |b Elsevier Digital, |c ©2005. | ||
300 | |a 1 online resource (xxx, 418 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration. | |
520 | |a In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Firewalls (Computer security) |0 http://id.loc.gov/authorities/subjects/sh00006011 | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
700 | 1 | |a Ellis, Scott |q (Scott Raymond), |d 1968- |1 https://id.oclc.org/worldcat/entity/E39PCjrfcWvrPXRDWK9Dd836Gb |0 http://id.loc.gov/authorities/names/n2004141878 | |
776 | 0 | 8 | |i Print version: |a Vacca, John R. |t Firewalls. |d Amsterdam ; Boston : Elsevier Digital, ©2005 |z 1555582974 |z 9781555582975 |w (DLC) 2004063211 |w (OCoLC)56942207 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555582975 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195149 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00005309 | ||
938 | |a ebrary |b EBRY |n ebr10186584 | ||
938 | |a EBSCOhost |b EBSC |n 195149 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 100708 | ||
938 | |a Internet Archive |b INAR |n firewallsjumpsta0000vacc | ||
938 | |a YBP Library Services |b YANK |n 2599504 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162595020 |
---|---|
_version_ | 1816881651834159104 |
adam_text | |
any_adam_object | |
author | Vacca, John R. |
author2 | Ellis, Scott (Scott Raymond), 1968- |
author2_role | |
author2_variant | s e se |
author_GND | http://id.loc.gov/authorities/names/n91039772 http://id.loc.gov/authorities/names/n2004141878 |
author_facet | Vacca, John R. Ellis, Scott (Scott Raymond), 1968- |
author_role | |
author_sort | Vacca, John R. |
author_variant | j r v jr jrv |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .V32 2005eb |
callnumber-search | TK5105.59 .V32 2005eb |
callnumber-sort | TK 45105.59 V32 42005EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration. |
ctrlnum | (OCoLC)162595020 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05349cam a2200661 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162595020</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070806s2005 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">MERUC</subfield><subfield code="d">UBY</subfield><subfield code="d">E7B</subfield><subfield code="d">U5D</subfield><subfield code="d">IDEBK</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBBG</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">VT2</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">70967856</subfield><subfield code="a">156908158</subfield><subfield code="a">441785424</subfield><subfield code="a">505145793</subfield><subfield code="a">606031738</subfield><subfield code="a">648305545</subfield><subfield code="a">856961547</subfield><subfield code="a">1035653112</subfield><subfield code="a">1153027897</subfield><subfield code="a">1162019686</subfield><subfield code="a">1192339078</subfield><subfield code="a">1240512574</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582975</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582974</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080491324</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080491325</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281007080</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281007087</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611007089</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611007083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162595020</subfield><subfield code="z">(OCoLC)70967856</subfield><subfield code="z">(OCoLC)156908158</subfield><subfield code="z">(OCoLC)441785424</subfield><subfield code="z">(OCoLC)505145793</subfield><subfield code="z">(OCoLC)606031738</subfield><subfield code="z">(OCoLC)648305545</subfield><subfield code="z">(OCoLC)856961547</subfield><subfield code="z">(OCoLC)1035653112</subfield><subfield code="z">(OCoLC)1153027897</subfield><subfield code="z">(OCoLC)1162019686</subfield><subfield code="z">(OCoLC)1192339078</subfield><subfield code="z">(OCoLC)1240512574</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">98321:98323</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.V32 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vacca, John R.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjtrrkDRw6CFBKw6vY94FX</subfield><subfield code="0">http://id.loc.gov/authorities/names/n91039772</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Firewalls :</subfield><subfield code="b">jumpstart for network and systems administrators /</subfield><subfield code="c">John R. Vacca, Scott Ellis.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier Digital,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 418 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00006011</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Scott</subfield><subfield code="q">(Scott Raymond),</subfield><subfield code="d">1968-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjrfcWvrPXRDWK9Dd836Gb</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2004141878</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Vacca, John R.</subfield><subfield code="t">Firewalls.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier Digital, ©2005</subfield><subfield code="z">1555582974</subfield><subfield code="z">9781555582975</subfield><subfield code="w">(DLC) 2004063211</subfield><subfield code="w">(OCoLC)56942207</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555582975</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195149</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00005309</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10186584</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">195149</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">100708</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">firewallsjumpsta0000vacc</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2599504</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162595020 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:07Z |
institution | BVB |
isbn | 9781555582975 1555582974 0080491324 9780080491325 1281007080 9781281007087 9786611007089 6611007083 |
language | English |
oclc_num | 162595020 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxx, 418 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital, |
record_format | marc |
spelling | Vacca, John R. https://id.oclc.org/worldcat/entity/E39PCjtrrkDRw6CFBKw6vY94FX http://id.loc.gov/authorities/names/n91039772 Firewalls : jumpstart for network and systems administrators / John R. Vacca, Scott Ellis. Amsterdam ; Boston : Elsevier Digital, ©2005. 1 online resource (xxx, 418 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration. In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures. Print version record. English. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Firewalls (Computer security) fast Ellis, Scott (Scott Raymond), 1968- https://id.oclc.org/worldcat/entity/E39PCjrfcWvrPXRDWK9Dd836Gb http://id.loc.gov/authorities/names/n2004141878 Print version: Vacca, John R. Firewalls. Amsterdam ; Boston : Elsevier Digital, ©2005 1555582974 9781555582975 (DLC) 2004063211 (OCoLC)56942207 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555582975 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195149 Volltext |
spellingShingle | Vacca, John R. Firewalls : jumpstart for network and systems administrators / Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- Firewall administration. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Firewalls (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh00006011 |
title | Firewalls : jumpstart for network and systems administrators / |
title_auth | Firewalls : jumpstart for network and systems administrators / |
title_exact_search | Firewalls : jumpstart for network and systems administrators / |
title_full | Firewalls : jumpstart for network and systems administrators / John R. Vacca, Scott Ellis. |
title_fullStr | Firewalls : jumpstart for network and systems administrators / John R. Vacca, Scott Ellis. |
title_full_unstemmed | Firewalls : jumpstart for network and systems administrators / John R. Vacca, Scott Ellis. |
title_short | Firewalls : |
title_sort | firewalls jumpstart for network and systems administrators |
title_sub | jumpstart for network and systems administrators / |
topic | Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Firewalls (Computer security) fast |
topic_facet | Firewalls (Computer security) Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. |
url | https://www.sciencedirect.com/science/book/9781555582975 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195149 |
work_keys_str_mv | AT vaccajohnr firewallsjumpstartfornetworkandsystemsadministrators AT ellisscott firewallsjumpstartfornetworkandsystemsadministrators |