Firewalls jumpstart for network and systems administrators

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will...

Full description

Saved in:
Bibliographic Details
Main Author: Vacca, John R (Author)
Other Authors: Ellis, Scott 1968- (Scott Raymond)
Format: Book
Language:English
Published: Boston Elsevier Digital 2005
Amsterdam
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-325426
005 20191029162143
008 t2005 NE ag| |#001 ##eng#D
020 # # |a 1555582974 
040 # # |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .V32 2005 
100 1 # |a Vacca, John R  |e author 
245 1 0 |a Firewalls  |b jumpstart for network and systems administrators  |c John R. Vacca, Scott Ellis 
260 # # |a Boston 
264 # 1 |a Amsterdam  |b Elsevier Digital  |c 2005 
300 # # |a xxx, 418 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references and index 
520 # # |a In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. 
650 # 0 |a Firewalls (Computer security) 
700 1 # |a Ellis, Scott  |c 1968-  |q (Scott Raymond) 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=325426 
964 # # |c BOK  |d 01 
040 # # |a Shah Alam 
998 # # |a 00260##a002.8.2||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||