Inside Network Perimeter Security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems

The most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network de...

Full description

Saved in:
Bibliographic Details
Main Author: Northcutt, Stephen (Author)
Other Authors: Edmead, Mark T.
Format: Book
Language:English
Published: Boston New Riders 2003
© 2003
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-280030
005 2020920141544
008 201020 2003 -US a|| |00 |#eng#D
020 # # |a 0735712328  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .I53 2003 
100 1 # |a Northcutt, Stephen  |e author 
245 1 1 |a Inside Network Perimeter Security  |b the definitive guide to firewalls, VPNs, routers, and intrusion detection systems  |c primary authors, Stephen Northcutt ... [et al.] ; contributing authors, Mark Edmead ... [et al.] 
264 # 1 |a Boston  |b New Riders  |c 2003 
264 # 1 |c © 2003 
300 # # |a xxvii, 678 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
520 # # |a The most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network defenses. It discusses perimeter components such as firewalls, VPNs, routers, and intrusion detection systems, and explains how to integrate them into a unified whole to meet real-world business requirements. The book consolidates the experience of seventeen information security professionals working together as a team of writers and reviewers. This is an excellent reference for those interested in examining best practices of perimeter defense and in expanding their knowledge of network security. Because the book was developed in close coordination with the SANS Institute, it is also a valuable supplementary resource for those pursuing the GIAC Certified Firewall Analyst (GCFW) certification. 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Northcutt, Stephen 
700 # # |a Edmead, Mark T. 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=280030 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00520##a007.2||00520##b007.2||01700##a0011.2.2||