Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Best Damn Firewall Book Period -  Syngress

Best Damn Firewall Book Period (eBook)

(Autor)

eBook Download: PDF
2003 | 1. Auflage
1329 Seiten
Elsevier Science (Verlag)
978-0-08-047606-3 (ISBN)
Systemvoraussetzungen
48,90 inkl. MwSt
(CHF 47,75)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.

The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them?

The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it-from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure.

The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up.

Anything needed to protect the perimeter of a network can be found in this book.

- This book is all encompassing, covering general Firewall issues and protocols, as well as specific products.
- Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource.
- The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.
This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them?The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it-from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure.The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book.- This book is all encompassing, covering general Firewall issues and protocols, as well as specific products.- Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource.- The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.

COVER 1
Contents 10
Foreword 34
Chapter 1 Introduction to Information Security 38
Chapter 2 Firewall Concepts 88
Chapter 3 DMZ Concepts, Layout, and Conceptual Design 108
Chapter 4 Introduction to Intrusion Detection Systems 146
Implementing a Firewall with Ipchains and Iptables 162
Chapter 6 Maintaining Open Source Firewalls 206
Chapter 7 Configuring Solaris as a Secure Router and Firewall 246
Chapter 8 Introduction to PIX Firewalls 276
Chapter 9 Passing Traffic 312
Chapter 10 Advanced PIX Configurations 344
Chapter 11 Troubleshooting and Performance Monitoring 402
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next Generation 456
Chapter 13 Using the Graphical Interface 526
Chapter 14 Creating a Security Policy 564
Chapter 15 Advanced Configurations 590
Chapter 16 Configuring Virtual Private Networks 612
Chapter 17 Overview of the Nokia Security Platform 638
Chapter 18 Configuring the Check Point Firewall 650
Chapter 19 Introducing the Voyager Web Interface 686
Chapter 20 Basic System Administration 716
Chapter 21 High Availability and Clustering 748
Chapter 22 ISA Server Deployment Planning and Design 848
Chapter 23 ISA Server Installation 882
Chapter 24 Managing ISA Server 916
Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA Server 976
Chapter 26 Troubleshooting ISA Server 1028
Chapter 27 Advanced Server Publishing with ISA Server 1060
Chapter 28 Protecting Mail Services with ISA Server 1140
Chapter 29 Introducing Snort 1218
Chapter 30 Installing Snort 1244
Chapter 31 Combining Firewalls and IDS 1264
Index 1304

Erscheint lt. Verlag 16.10.2003
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-08-047606-6 / 0080476066
ISBN-13 978-0-08-047606-3 / 9780080476063
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95