Login to ask the library to add a book.
|
|
Active Filter Settings
No Active Filters
|
|
|
|
first record
| previous record
| next record
| last record
|
full | marc
|
Record 1 of 1
|
|
|
Total Requests 0 Unsatisfied Requests 0
|
You searched IISERK - Author: Vaidyanadhan, R.
|
Request |
|
Call Number
|
005.8
|
Author
|
Vacca, John R.
|
Title
|
Firewalls [electronic resource] : jumpstart for network and systems administrators / John R. Vacca, Scott Ellis.
|
Publication
|
Amsterdam ; Boston : Elsevier Digital, c2005.
|
Material Info.
|
xxx, 418 p. : ill. ; 24 cm.
|
Summary Note
|
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures.
|
Notes
|
Includes bibliographical references and index.
|
Notes
|
Firewalls: What Are They?; Type Of Security Policy; Firewall Types; Choosing The Right Firewall; Firewall Topologies; Installation Preparation; Firewall Configuration; Simple Policy Implementation; Complex Services Management; Filtering Content; Publicly Accessible Servers Implementation; Architecture Selection; External Servers Protection; Firewall Architecture DNS Customization; Network Address Translation (NAT) Deployment; Privacy And Authentication; Tunneling: Firewall-to-Firewall; Auditing And Logging; Firewall Administration; Summary, Conclusions, and Recommendations.
|
Notes
|
Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2007.
|
ISBN
|
9781555582975
|
ISBN
|
1555582974
|
Subject
|
Firewalls (Computer security)
|
Subject
|
Electronic books.
|
Added Entry
|
Ellis, Scott (Scott Raymond), 1968-
|
Added Entry
|
ScienceDirect (Online service)
|
Date
|
Year, Month, Day:01405141
|
Link
|
An electronic book accessible through the World Wide Web; click for information ScienceDirect
|
Link
|
Table of contents
|
Link
|
Publisher description
|
|
|
|
|