Firewalls jumpstart for network and systems administrators
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Unknown |
Language: | English |
Published: |
Boston
Elsevier Digital
2005
Amsterdam |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-325426 | ||
005 | 20191029162143 | ||
008 | t2005 NE ag| |#001 ##eng#D | ||
020 | # | # | |a 1555582974 |
040 | # | # | |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .V32 2005 |
100 | 1 | # | |a Vacca, John R |e author |
245 | 1 | 0 | |a Firewalls |b jumpstart for network and systems administrators |c John R. Vacca, Scott Ellis |
260 | # | # | |a Boston |
264 | # | 1 | |a Amsterdam |b Elsevier Digital |c 2005 |
300 | # | # | |a xxx, 418 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references and index |
520 | # | # | |a In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. |
650 | # | 0 | |a Firewalls (Computer security) |
700 | 1 | # | |a Ellis, Scott |c 1968- |q (Scott Raymond) |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=325426 |
964 | # | # | |c BOK |d 01 |
040 | # | # | |a Shah Alam |
998 | # | # | |a 00260##a002.8.2||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |