Firewall policies and VPN configurations /
Firewall policies and VPN configurations /
Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell.
- Rockland, MA : Syngress, ©2006.
- 1 online resource (xxii, 482 pages) : illustrations
Includes index.
Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time;
This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t.
English.
9780080506517 0080506518 9781429415903 1429415908 9781281078346 1281078344 9786611078348 6611078347
792502908815
CL0500000009 Safari Books Online
GBB739161 bnb
017581940 Uk
Computer networks--Security measures.
Firewalls (Computer security)
Réseaux d'ordinateurs--Sécurité--Mesures.
Coupe-feu (Sécurité informatique)
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer networks--Security measures
Firewalls (Computer security)
TK5105.59 / .F57 2006eb
005.8
Includes index.
Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time;
This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t.
English.
9780080506517 0080506518 9781429415903 1429415908 9781281078346 1281078344 9786611078348 6611078347
792502908815
CL0500000009 Safari Books Online
GBB739161 bnb
017581940 Uk
Computer networks--Security measures.
Firewalls (Computer security)
Réseaux d'ordinateurs--Sécurité--Mesures.
Coupe-feu (Sécurité informatique)
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer networks--Security measures
Firewalls (Computer security)
TK5105.59 / .F57 2006eb
005.8