Firewall design and analysis /:
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-pron...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore ; Hackensack, NJ :
World Scientific,
©2011.
|
Schriftenreihe: | Computer and network security ;
v. 4. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security. |
Beschreibung: | 1 online resource (xi, 109 pages) : illustrations. |
Bibliographie: | Includes bibliographical references (pages 105-108) and index. |
ISBN: | 9789814261661 9814261661 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn742566319 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110726s2011 si a ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d STF |d YDXCP |d OCLCQ |d COO |d UIU |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d VTS |d LEAUB |d EYM |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d SXB |d OCLCQ |d OCLCO |d OCLCQ | ||
019 | |a 889113256 |a 1086437568 | ||
020 | |a 9789814261661 |q (electronic bk.) | ||
020 | |a 9814261661 |q (electronic bk.) | ||
020 | |z 9789814261654 | ||
020 | |z 9814261653 | ||
035 | |a (OCoLC)742566319 |z (OCoLC)889113256 |z (OCoLC)1086437568 | ||
050 | 4 | |a TK5105.59 |b .L57 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Liu, Alex X. |1 https://id.oclc.org/worldcat/entity/E39PCjwp88YyTTJkV8xWQQwPV3 |0 http://id.loc.gov/authorities/names/no2010165585 | |
245 | 1 | 0 | |a Firewall design and analysis / |c Alex X. Liu. |
260 | |a Singapore ; |a Hackensack, NJ : |b World Scientific, |c ©2011. | ||
300 | |a 1 online resource (xi, 109 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Series in computer and network security ; |v v. 4 | |
504 | |a Includes bibliographical references (pages 105-108) and index. | ||
505 | 0 | |a 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions. | |
520 | |a This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Firewalls (Computer security) |0 http://id.loc.gov/authorities/subjects/sh00006011 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
776 | 0 | 8 | |i Print version: |a Liu, Alex X. |t Firewall design and analysis. |d Singapore : World Scientific, ©2011 |z 9789814261654 |w (OCoLC)298781586 |
830 | 0 | |a Computer and network security ; |v v. 4. |0 http://id.loc.gov/authorities/names/no2008008076 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=374805 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=374805 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 374805 | ||
938 | |a YBP Library Services |b YANK |n 6965033 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn742566319 |
---|---|
_version_ | 1829094702065909760 |
adam_text | |
any_adam_object | |
author | Liu, Alex X. |
author_GND | http://id.loc.gov/authorities/names/no2010165585 |
author_facet | Liu, Alex X. |
author_role | |
author_sort | Liu, Alex X. |
author_variant | a x l ax axl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .L57 2011eb |
callnumber-search | TK5105.59 .L57 2011eb |
callnumber-sort | TK 45105.59 L57 42011EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions. |
ctrlnum | (OCoLC)742566319 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04713cam a2200577 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn742566319</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">110726s2011 si a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">STF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">LEAUB</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">889113256</subfield><subfield code="a">1086437568</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814261661</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9814261661</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789814261654</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9814261653</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)742566319</subfield><subfield code="z">(OCoLC)889113256</subfield><subfield code="z">(OCoLC)1086437568</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.L57 2011eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Alex X.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjwp88YyTTJkV8xWQQwPV3</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010165585</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Firewall design and analysis /</subfield><subfield code="c">Alex X. Liu.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore ;</subfield><subfield code="a">Hackensack, NJ :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 109 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Series in computer and network security ;</subfield><subfield code="v">v. 4</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 105-108) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00006011</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Liu, Alex X.</subfield><subfield code="t">Firewall design and analysis.</subfield><subfield code="d">Singapore : World Scientific, ©2011</subfield><subfield code="z">9789814261654</subfield><subfield code="w">(OCoLC)298781586</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 4.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008008076</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=374805</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=374805</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">374805</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">6965033</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn742566319 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:37:19Z |
institution | BVB |
isbn | 9789814261661 9814261661 |
language | English |
oclc_num | 742566319 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xi, 109 pages) : illustrations. |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | World Scientific, |
record_format | marc |
series | Computer and network security ; |
series2 | Series in computer and network security ; |
spelling | Liu, Alex X. https://id.oclc.org/worldcat/entity/E39PCjwp88YyTTJkV8xWQQwPV3 http://id.loc.gov/authorities/names/no2010165585 Firewall design and analysis / Alex X. Liu. Singapore ; Hackensack, NJ : World Scientific, ©2011. 1 online resource (xi, 109 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Series in computer and network security ; v. 4 Includes bibliographical references (pages 105-108) and index. 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions. This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security. Print version record. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast Print version: Liu, Alex X. Firewall design and analysis. Singapore : World Scientific, ©2011 9789814261654 (OCoLC)298781586 Computer and network security ; v. 4. http://id.loc.gov/authorities/names/no2008008076 |
spellingShingle | Liu, Alex X. Firewall design and analysis / Computer and network security ; 1. Prologue. 1.1. Background and motivation. 1.2. Previous work. 1.3. Contributions of the book. 1.4. Overview of the book -- 2. Structured firewall design. 2.1. Motivation. 2.2. Firewall decision diagrams. 2.3. FDD reduction. 2.4. FDD marking. 2.5. Firewall generation. 2.6. Firewall compaction. 2.7. Firewall simplification. 2.8. Summary of structured firewall design -- 3. Diverse firewall design. 3.1. Construction algorithm. 3.2. Shaping algorithm. 3.3. Comparison algorithm. 3.4. Experimental results -- 4. Stateful firewall model. 4.1. Firewall model. 4.2. Firewall examples. 4.3. Removing packets from firewall state. 4.4. Firewall states. 4.5. Firewall properties -- 5. Firewall queries. 5.1. Structured firewall query language. 5.2. Firewall query examples. 5.3. Firewall query processing. 5.4. FDT-based firewall query processing algorithm. 5.5. Experimental results -- 6. Firewall redundancy detection. 6.1. Firewall redundant rules. 6.2. Removing upward redundancy. 6.3. Removing downward redundancy. 6.4. Experimental results -- 7. Epilogue. 7.1. Conclusions. Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh00006011 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Firewall design and analysis / |
title_auth | Firewall design and analysis / |
title_exact_search | Firewall design and analysis / |
title_full | Firewall design and analysis / Alex X. Liu. |
title_fullStr | Firewall design and analysis / Alex X. Liu. |
title_full_unstemmed | Firewall design and analysis / Alex X. Liu. |
title_short | Firewall design and analysis / |
title_sort | firewall design and analysis |
topic | Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast |
topic_facet | Firewalls (Computer security) Computer networks Security measures. Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures |
work_keys_str_mv | AT liualexx firewalldesignandanalysis |