Guide to Firewalls and VPNs
Cengage Learning, Dec 20, 2012 - Computers - 368 pages
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving students the opportunity to hone and apply the knowledge and skills they will need as working professionals. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals.
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Introduction to Information Security
Security Policies and Standards
Introduction to Firewalls
Firewall Configuration and Administration
Working with Proxy Servers and ApplicationLevel Firewalls
Other editions - View all
2011 Cengage Learning access control administrator Alex allow application attack authentication baseline bastion host block browser button Cengage Learning 2012 certificate chapter ciphertext client configuration copied Copyright 2011 Cengage create Data Mart decrypt destination device dialog box disaster Due to electronic duplicated e-mail eBook and/or eChapter(s electronic rights employees encryption Enter set firewall external Figure functions gateway hacker hardware header ICMP implement inbound information assets information security install interface internal network Internet IP address IPSec Kerberos Microsoft NetProxy operating system options organization organization’s outbound packet filtering packet-filtering password perform perimeter press Enter protect protocol proxy server public key Rachel requests Rights Reserved router rule set scanned security policy set firewall name specific suppressed TCP/IP third party content threats traffic TrueCrypt VPN connection vulnerabilities Vyatta whole Windows