Guide to Firewalls and VPNs

Author: Michael E. Whitman

Publisher: Cengage Learning

ISBN:

Category: Computers

Page: 368

View: 518

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving students the opportunity to hone and apply the knowledge and skills they will need as working professionals. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Guide to Firewalls and Network Security

Intrusion Detection and VPNs

Author: Michael E. Whitman

Publisher: Course Technology Ptr

ISBN:

Category: Computers

Page: 496

View: 185

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.

Guide to Firewalls and Network Security

With Intrusion Detection and VPNs

Author: Greg Holden

Publisher: Course Technology Ptr

ISBN:

Category: Computers

Page: 433

View: 558

Provides comprehensive overview of building and maintaining firewalls in a business environment, and maps to the objectives of CheckPoint’s CCSA certification.

Guide to Network Security

Author: Michael E. Whitman

Publisher: Cengage Learning

ISBN:

Category: Computers

Page: 512

View: 441

GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for students who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Inside Network Perimeter Security

The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems

Author: Stephen Northcutt

Publisher: Sams

ISBN:

Category: Computers

Page: 678

View: 833

Examines how various security methods are used and how they work, covering options including packet filtering, proxy firewalls, network intrusion detection, virtual private networks, and encryption.

Cisco Security Specialists Guide to PIX Firewall

Author: Syngress

Publisher: Elsevier

ISBN:

Category: Computers

Page: 608

View: 771

Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration. Coverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0 Must-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis Firewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market

Network Security, Firewalls, and VPNs

Author: CTI Reviews

Publisher: Cram101 Textbook Reviews

ISBN:

Category: Education

Page: 198

View: 717

Facts101 is your complete guide to Network Security, Firewalls, and VPNs. In this book, you will learn topics such as VPN Fundamentals, Network Security Threats and Issues, Network Security Implementation, and Network Security Management plus much more. With key features such as key terms, people and places, Facts101 gives you all the information you need to prepare for your next exam. Our practice tests are specific to the textbook and we have designed tools to make the most of your limited study time.

Hands-On Information Security Lab Manual

Author: Michael E. Whitman

Publisher: Cengage Learning

ISBN:

Category: Computers

Page: 592

View: 135

HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, helps you hone essential information security skills by applying your knowledge to detailed, realistic exercises using Microsoft Windows 2000, Windows XP, Windows 7, and Linux. This wide-ranging, non-certification-based lab manual includes coverage of scanning, OS vulnerability analysis and resolution, firewalls, security maintenance, forensics, and more. The Fourth Edition includes new introductory labs focused on virtualization techniques and images, giving you valuable experience with some of the most important trends and practices in information security and networking today. All software necessary to complete the labs are available online as a free download. An ideal resource for introductory, technical, and managerial courses or self-study, this versatile manual is a perfect supplement to the PRINCIPLES OF INFORMATION SECURITY, SECURITY FUNDAMENTALS, and MANAGEMENT OF INFORMATION SECURITY books. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.