Firewalls : jumpstart for network and systems administrators /
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will...
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Group Author: | |
Published: |
Elsevier Digital,
|
Publisher Address: | Amsterdam ; Boston : |
Publication Dates: | 2005. |
Literature type: | eBook |
Language: | English |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9781555582975 |
Summary: |
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing s |
Carrier Form: | 1 online resource (xxx, 418 pages) : illustrations |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9781555582975 1555582974 0080491324 9780080491325 |
Index Number: | TK5105 |
CLC: | TP393.5 |
Contents: | Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging -- |