My Account | Home| Bulletin Board| Cart | Help
Close Session
IISER-KIndian Institute of Science Education & Research - Kolkata
Quick Search
Search Terms:
All Documents
Books
Newspapers
Periodicals
Articles
Theses
E-Books
Database : IISERK

Set Session Filters
Login to ask the library to add a book.
Active Filter Settings
No Active Filters
There are 0 titles in your cart.

Search History
Special Collections: Government Publications
ty:m & bl:m
Special Collections: Audio Cassettes
Special Collections: Music Scores
Serial Collections: Newspapers
Special Collections: Maps
Recommended Reading
first record | previous record | next record | last record
full | marc
Record 1 of 1
  Total Requests  0      Unsatisfied Requests  0
You searched IISERK - Author: Vaidyanadhan, R.
Request
Call Number 005.8
Author Vacca, John R.
Title Firewalls [electronic resource] : jumpstart for network and systems administrators / John R. Vacca, Scott Ellis.
Publication Amsterdam ; Boston : Elsevier Digital, c2005.
Material Info. xxx, 418 p. : ill. ; 24 cm.
Summary Note In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures.
Notes Includes bibliographical references and index.
Notes Firewalls: What Are They?; Type Of Security Policy; Firewall Types; Choosing The Right Firewall; Firewall Topologies; Installation Preparation; Firewall Configuration; Simple Policy Implementation; Complex Services Management; Filtering Content; Publicly Accessible Servers Implementation; Architecture Selection; External Servers Protection; Firewall Architecture DNS Customization; Network Address Translation (NAT) Deployment; Privacy And Authentication; Tunneling: Firewall-to-Firewall; Auditing And Logging; Firewall Administration; Summary, Conclusions, and Recommendations.
Notes Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2007.
ISBN 9781555582975
ISBN 1555582974
Subject Firewalls (Computer security)
Subject Electronic books.
Added Entry Ellis, Scott (Scott Raymond), 1968-
Added Entry ScienceDirect (Online service)
Date Year, Month, Day:01405141
Link An electronic book accessible through the World Wide Web; click for information ScienceDirect
Link Table of contents
Link Publisher description

Keyword Search

 Words: Search Type:
 
 

Database: IISERK

Any filter options that are chosen below will be combined with the Session Filters and applied to the search.
Nature of Contents Filters Format Filters

Including Excluding

Including Excluding
Language Filters Place of Publication Filters

Including Excluding

Including Excluding
Publication Date Context Date
  -     -  

Set Session Filters
Select below to return to the last:
Copyright © 2014 VTLS Inc. All rights reserved.
VTLS.com