Firewall policies and VPN configurations /:
This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhel...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2006.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxii, 482 pages) : illustrations |
ISBN: | 9780080506517 0080506518 9781429415903 1429415908 9781281078346 1281078344 9786611078348 6611078347 |
Zugangseinschränkungen: | Legal Deposit; |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn560282086 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 061005s2006 maua o 001 0 eng d | ||
040 | |a MERUC |b eng |e pn |c MERUC |d CCO |d E7B |d IDEBK |d OCLCQ |d UMI |d BAKER |d TXJ |d CEF |d YDXCP |d COO |d DKDLA |d ZCU |d ZAD |d DEBSZ |d OCLCQ |d N$T |d OPELS |d OKU |d HVC |d FVL |d B24X7 |d OCLCQ |d OCLCF |d AU@ |d OCLCQ |d AZK |d LOA |d CNNOR |d COCUF |d MOR |d PIFBR |d LIV |d OCLCQ |d JBG |d OCLCQ |d U3W |d STF |d BRL |d WRM |d D6H |d VTS |d AGLDB |d NLE |d NRAMU |d VT2 |d INT |d OCLCQ |d A6Q |d UKMGB |d OCLCQ |d LEAUB |d M8D |d OCLCQ |d NLW |d VLY |d BRF |d UKCRE |d UIU |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d INARC |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
015 | |a GBB739161 |2 bnb | ||
016 | 7 | |a 017581940 |2 Uk | |
019 | |a 76963031 |a 123904756 |a 144222804 |a 144618820 |a 162597511 |a 181421145 |a 183266436 |a 473844658 |a 482014511 |a 507134317 |a 647580548 |a 722510483 |a 728025453 |a 765142755 |a 780950061 |a 823830733 |a 823900444 |a 824091776 |a 824140017 |a 856959849 |a 961574811 |a 962614314 |a 966248385 |a 988534784 |a 991980217 |a 1035670111 |a 1037497459 |a 1038616169 |a 1045522729 |a 1052104208 |a 1055261214 |a 1063988384 |a 1076284601 |a 1081209904 |a 1117954217 |a 1119946940 |a 1152992727 |a 1162571316 |a 1202558631 |a 1274835472 | ||
020 | |a 9780080506517 | ||
020 | |a 0080506518 | ||
020 | |a 9781429415903 |q (electronic bk.) | ||
020 | |a 1429415908 |q (electronic bk.) | ||
020 | |a 9781281078346 | ||
020 | |a 1281078344 | ||
020 | |z 1597490881 | ||
020 | |z 9781597490887 | ||
020 | |z 9780080506517 | ||
020 | |a 9786611078348 | ||
020 | |a 6611078347 | ||
024 | 1 | |a 792502908815 | |
035 | |a (OCoLC)560282086 |z (OCoLC)76963031 |z (OCoLC)123904756 |z (OCoLC)144222804 |z (OCoLC)144618820 |z (OCoLC)162597511 |z (OCoLC)181421145 |z (OCoLC)183266436 |z (OCoLC)473844658 |z (OCoLC)482014511 |z (OCoLC)507134317 |z (OCoLC)647580548 |z (OCoLC)722510483 |z (OCoLC)728025453 |z (OCoLC)765142755 |z (OCoLC)780950061 |z (OCoLC)823830733 |z (OCoLC)823900444 |z (OCoLC)824091776 |z (OCoLC)824140017 |z (OCoLC)856959849 |z (OCoLC)961574811 |z (OCoLC)962614314 |z (OCoLC)966248385 |z (OCoLC)988534784 |z (OCoLC)991980217 |z (OCoLC)1035670111 |z (OCoLC)1037497459 |z (OCoLC)1038616169 |z (OCoLC)1045522729 |z (OCoLC)1052104208 |z (OCoLC)1055261214 |z (OCoLC)1063988384 |z (OCoLC)1076284601 |z (OCoLC)1081209904 |z (OCoLC)1117954217 |z (OCoLC)1119946940 |z (OCoLC)1152992727 |z (OCoLC)1162571316 |z (OCoLC)1202558631 |z (OCoLC)1274835472 | ||
037 | |a CL0500000009 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .F57 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Firewall policies and VPN configurations / |c Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell. |
260 | |a Rockland, MA : |b Syngress, |c ©2006. | ||
300 | |a 1 online resource (xxii, 482 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
500 | |a Includes index. | ||
505 | 0 | |a Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index. | |
520 | |a This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t. | ||
588 | 0 | |a Print version record. | |
506 | 1 | |a Legal Deposit; |c Only available on premises controlled by the deposit library and to one user at any one time; |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK). |5 WlAbNL | |
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Firewalls (Computer security) |0 http://id.loc.gov/authorities/subjects/sh00006011 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
700 | 1 | |a Henmi, Anne. |1 https://id.oclc.org/worldcat/entity/E39PCjHdgMWxmVhKWTj4QPbFjC |0 http://id.loc.gov/authorities/names/no2008023978 | |
700 | 1 | |a Lucas, Mark. | |
700 | 1 | |a Singh, Abhishek. | |
700 | 1 | |a Cantrell, Chris. | |
758 | |i has work: |a Firewall policies and VPN configurations (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGBQ3YPccjMCjrpmpF6wcq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Firewall policies and VPN configurations. |d Rockland, MA : Syngress, ©2006 |z 1597490881 |w (OCoLC)71844064 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490887 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=170636 |3 Volltext |
938 | |a Internet Archive |b INAR |n firewallpolicies0000unse | ||
938 | |a Books 24x7 |b B247 |n bks00016127 | ||
938 | |a Baker & Taylor |b BKTY |c 49.95 |d 49.95 |i 1597490881 |n 0006795630 |s active | ||
938 | |a ebrary |b EBRY |n ebr10142565 | ||
938 | |a EBSCOhost |b EBSC |n 170636 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 107834 | ||
938 | |a YBP Library Services |b YANK |n 2627198 | ||
938 | |a YBP Library Services |b YANK |n 2500039 | ||
938 | |a YBP Library Services |b YANK |n 2730651 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn560282086 |
---|---|
_version_ | 1816881707407638528 |
adam_text | |
any_adam_object | |
author2 | Henmi, Anne Lucas, Mark Singh, Abhishek Cantrell, Chris |
author2_role | |
author2_variant | a h ah m l ml a s as c c cc |
author_GND | http://id.loc.gov/authorities/names/no2008023978 |
author_facet | Henmi, Anne Lucas, Mark Singh, Abhishek Cantrell, Chris |
author_sort | Henmi, Anne |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .F57 2006eb |
callnumber-search | TK5105.59 .F57 2006eb |
callnumber-sort | TK 45105.59 F57 42006EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index. |
ctrlnum | (OCoLC)560282086 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06220cam a2200877Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn560282086</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">061005s2006 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MERUC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">BAKER</subfield><subfield code="d">TXJ</subfield><subfield code="d">CEF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">COO</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">ZAD</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">HVC</subfield><subfield code="d">FVL</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">CNNOR</subfield><subfield code="d">COCUF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">NLE</subfield><subfield code="d">NRAMU</subfield><subfield code="d">VT2</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLW</subfield><subfield code="d">VLY</subfield><subfield code="d">BRF</subfield><subfield code="d">UKCRE</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB739161</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017581940</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">76963031</subfield><subfield code="a">123904756</subfield><subfield code="a">144222804</subfield><subfield code="a">144618820</subfield><subfield code="a">162597511</subfield><subfield code="a">181421145</subfield><subfield code="a">183266436</subfield><subfield code="a">473844658</subfield><subfield code="a">482014511</subfield><subfield code="a">507134317</subfield><subfield code="a">647580548</subfield><subfield code="a">722510483</subfield><subfield code="a">728025453</subfield><subfield code="a">765142755</subfield><subfield code="a">780950061</subfield><subfield code="a">823830733</subfield><subfield code="a">823900444</subfield><subfield code="a">824091776</subfield><subfield code="a">824140017</subfield><subfield code="a">856959849</subfield><subfield code="a">961574811</subfield><subfield code="a">962614314</subfield><subfield code="a">966248385</subfield><subfield code="a">988534784</subfield><subfield code="a">991980217</subfield><subfield code="a">1035670111</subfield><subfield code="a">1037497459</subfield><subfield code="a">1038616169</subfield><subfield code="a">1045522729</subfield><subfield code="a">1052104208</subfield><subfield code="a">1055261214</subfield><subfield code="a">1063988384</subfield><subfield code="a">1076284601</subfield><subfield code="a">1081209904</subfield><subfield code="a">1117954217</subfield><subfield code="a">1119946940</subfield><subfield code="a">1152992727</subfield><subfield code="a">1162571316</subfield><subfield code="a">1202558631</subfield><subfield code="a">1274835472</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080506517</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080506518</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429415903</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429415908</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281078346</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281078344</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490881</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597490887</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780080506517</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611078348</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611078347</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502908815</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560282086</subfield><subfield code="z">(OCoLC)76963031</subfield><subfield code="z">(OCoLC)123904756</subfield><subfield code="z">(OCoLC)144222804</subfield><subfield code="z">(OCoLC)144618820</subfield><subfield code="z">(OCoLC)162597511</subfield><subfield code="z">(OCoLC)181421145</subfield><subfield code="z">(OCoLC)183266436</subfield><subfield code="z">(OCoLC)473844658</subfield><subfield code="z">(OCoLC)482014511</subfield><subfield code="z">(OCoLC)507134317</subfield><subfield code="z">(OCoLC)647580548</subfield><subfield code="z">(OCoLC)722510483</subfield><subfield code="z">(OCoLC)728025453</subfield><subfield code="z">(OCoLC)765142755</subfield><subfield code="z">(OCoLC)780950061</subfield><subfield code="z">(OCoLC)823830733</subfield><subfield code="z">(OCoLC)823900444</subfield><subfield code="z">(OCoLC)824091776</subfield><subfield code="z">(OCoLC)824140017</subfield><subfield code="z">(OCoLC)856959849</subfield><subfield code="z">(OCoLC)961574811</subfield><subfield code="z">(OCoLC)962614314</subfield><subfield code="z">(OCoLC)966248385</subfield><subfield code="z">(OCoLC)988534784</subfield><subfield code="z">(OCoLC)991980217</subfield><subfield code="z">(OCoLC)1035670111</subfield><subfield code="z">(OCoLC)1037497459</subfield><subfield code="z">(OCoLC)1038616169</subfield><subfield code="z">(OCoLC)1045522729</subfield><subfield code="z">(OCoLC)1052104208</subfield><subfield code="z">(OCoLC)1055261214</subfield><subfield code="z">(OCoLC)1063988384</subfield><subfield code="z">(OCoLC)1076284601</subfield><subfield code="z">(OCoLC)1081209904</subfield><subfield code="z">(OCoLC)1117954217</subfield><subfield code="z">(OCoLC)1119946940</subfield><subfield code="z">(OCoLC)1152992727</subfield><subfield code="z">(OCoLC)1162571316</subfield><subfield code="z">(OCoLC)1202558631</subfield><subfield code="z">(OCoLC)1274835472</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000009</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.F57 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Firewall policies and VPN configurations /</subfield><subfield code="c">Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 482 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1="1" ind2=" "><subfield code="a">Legal Deposit;</subfield><subfield code="c">Only available on premises controlled by the deposit library and to one user at any one time;</subfield><subfield code="e">The Legal Deposit Libraries (Non-Print Works) Regulations (UK).</subfield><subfield code="5">WlAbNL</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00006011</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Henmi, Anne.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHdgMWxmVhKWTj4QPbFjC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008023978</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lucas, Mark.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Abhishek.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cantrell, Chris.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Firewall policies and VPN configurations (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGBQ3YPccjMCjrpmpF6wcq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Firewall policies and VPN configurations.</subfield><subfield code="d">Rockland, MA : Syngress, ©2006</subfield><subfield code="z">1597490881</subfield><subfield code="w">(OCoLC)71844064</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490887</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=170636</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">firewallpolicies0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00016127</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">49.95</subfield><subfield code="d">49.95</subfield><subfield code="i">1597490881</subfield><subfield code="n">0006795630</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10142565</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">170636</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">107834</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627198</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2500039</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730651</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn560282086 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:00Z |
institution | BVB |
isbn | 9780080506517 0080506518 9781429415903 1429415908 9781281078346 1281078344 9786611078348 6611078347 |
language | English |
oclc_num | 560282086 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxii, 482 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress, |
record_format | marc |
spelling | Firewall policies and VPN configurations / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell. Rockland, MA : Syngress, ©2006. 1 online resource (xxii, 482 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Includes index. Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index. This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t. Print version record. Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK). WlAbNL English. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast Henmi, Anne. https://id.oclc.org/worldcat/entity/E39PCjHdgMWxmVhKWTj4QPbFjC http://id.loc.gov/authorities/names/no2008023978 Lucas, Mark. Singh, Abhishek. Cantrell, Chris. has work: Firewall policies and VPN configurations (Text) https://id.oclc.org/worldcat/entity/E39PCGBQ3YPccjMCjrpmpF6wcq https://id.oclc.org/worldcat/ontology/hasWork Print version: Firewall policies and VPN configurations. Rockland, MA : Syngress, ©2006 1597490881 (OCoLC)71844064 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490887 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=170636 Volltext |
spellingShingle | Firewall policies and VPN configurations / Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh00006011 |
title | Firewall policies and VPN configurations / |
title_auth | Firewall policies and VPN configurations / |
title_exact_search | Firewall policies and VPN configurations / |
title_full | Firewall policies and VPN configurations / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell. |
title_fullStr | Firewall policies and VPN configurations / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell. |
title_full_unstemmed | Firewall policies and VPN configurations / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell. |
title_short | Firewall policies and VPN configurations / |
title_sort | firewall policies and vpn configurations |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast |
topic_facet | Computer networks Security measures. Firewalls (Computer security) Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures |
url | https://www.sciencedirect.com/science/book/9781597490887 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=170636 |
work_keys_str_mv | AT henmianne firewallpoliciesandvpnconfigurations AT lucasmark firewallpoliciesandvpnconfigurations AT singhabhishek firewallpoliciesandvpnconfigurations AT cantrellchris firewallpoliciesandvpnconfigurations |