Inside Network Perimeter Security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
The most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network de...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Book |
Language: | English |
Published: |
Boston
New Riders
2003
© 2003 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-280030 | ||
005 | 2020920141544 | ||
008 | 201020 2003 -US a|| |00 |#eng#D | ||
020 | # | # | |a 0735712328 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .I53 2003 |
100 | 1 | # | |a Northcutt, Stephen |e author |
245 | 1 | 1 | |a Inside Network Perimeter Security |b the definitive guide to firewalls, VPNs, routers, and intrusion detection systems |c primary authors, Stephen Northcutt ... [et al.] ; contributing authors, Mark Edmead ... [et al.] |
264 | # | 1 | |a Boston |b New Riders |c 2003 |
264 | # | 1 | |c © 2003 |
300 | # | # | |a xxvii, 678 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | # | # | |a Includes index |
520 | # | # | |a The most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network defenses. It discusses perimeter components such as firewalls, VPNs, routers, and intrusion detection systems, and explains how to integrate them into a unified whole to meet real-world business requirements. The book consolidates the experience of seventeen information security professionals working together as a team of writers and reviewers. This is an excellent reference for those interested in examining best practices of perimeter defense and in expanding their knowledge of network security. Because the book was developed in close coordination with the SANS Institute, it is also a valuable supplementary resource for those pursuing the GIAC Certified Firewall Analyst (GCFW) certification. |
650 | # | 0 | |a Computer networks |x Security measures |
700 | 1 | # | |a Northcutt, Stephen |
700 | # | # | |a Edmead, Mark T. |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=280030 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||01700##a0011.2.2|| |