Firewalls: The Complete Reference
Keith Strassberg, Gary Rollie, Richard Gondek
- 出版商: McGraw-Hill Education
- 出版日期: 2002-05-28
- 售價: $2,210
- 貴賓價: 9.5 折 $2,100
- 語言: 英文
- 頁數: 960
- 裝訂: Paperback
- ISBN: 0072195673
- ISBN-13: 9780072195675
已過版
買這商品的人也買了...
-
$888Building Linux Clusters: Scaling Linux for Scientific and Enterprise Application (Paperback)
-
$680$578 -
$399Solaris Internals: Core Kernel Architecture
-
$399Hack Proofing Linux: A Guide to Open Source Security
-
$750Cisco Secure Intrusion Detection System (Hardcover)
-
$1,670$1,587 -
$399RHCE Red Hat Certified Engineer LINUX Study Guide, 2/e (Hardcover)
-
$888Component Development for the Java Platform (Paperback)
-
$1,670$1,587 -
$490$417 -
$350Faster Smarter Beginning Programming
-
$525Itanium Rising: Breaking Through Moore's Second Law of Computing Power
-
$560$504 -
$1,860$1,767 -
$750$638 -
$420$328 -
$750$638 -
$580$458 -
$590$466 -
$650$553 -
$750$675 -
$560$504 -
$299$254 -
$2,340$2,223 -
$550$429
相關主題
商品描述
The Most Comprehensive Firewalls Resource Available
Get in-depth, objective advice on installing and configuring todays most popular firewalls including Check PointTM Firewall-1® 4.1 and NG, Cisco® PIX, Microsoft® ISA Server, NetScreenTM, SonicWall and SymantecTM --and learn strategies for successful network design and firewall placement. Gain insight into common methods for attacking firewalls--including software bugs, viruses, and misconfigurations. Learn firewall best practices and how to improve the overall security of your firewall installation. This multipurpose guide contains all the implementation and administration information you need to keep your network safe from unauthorized access.
- Restrict access to your network without compromising usability and
functionality
- Understand the strengths and limitations of firewall technology
- Get in-depth explanations of network and port address translation, VPNs,
authentication, virus protection, content filtering, and more
- Learn about the various architectures available today--application and
circuit-level gateways, packet filters, and stateful packet inspection engines
- Find out how hackers commonly go about breaking into a network
- Get details on platforms and features for key products from Check
PointTM, Cisco®,
SymantecTM, Microsoft®, and others
- Manage your firewall installation using built-in tools, objects, and
services
- Supplement your firewall system by implementing human controls such as
education and log monitoring
- Understand the details of implementing the Cisco Secure Policy Manager
- Learn the latest on Check Point NG Firewall-1, CiscoTM IOS Firewall Feature Set, and Linux IP Tables
Contents
1: Introduction
2: TCP/IP
Fundamentals for Firewall Administrators
3: Network
Design Considerations
4: Firewall
Architectures
5: Advanced Firewall
Functionality
6: Hacking the
Firewall
7: Check Point FireWall-1
Overview
8: FireWall-1
Installation
9: FireWall-1
Configuration
10: FireWall-1 Advanced
Functionality
11: Check Point Next
Generation
12: Cisco Private Internet Exchange
(PIX)
13: Cisco PIX Installation
14: Cisco PIX Configuration
15: Cisco PIX Advanced
Functionality
16: Cisco Secure Policy
Manager
17: Cisco IOS Firewall Feature
Set
18: Linux Kernel
Firewalls-Iptables
19: Symantec Enterprise Firewall
Background and Installation
20: Symantec Enterprise
Firewall Configuration
21: Symantec Enterprise Firewall
Advanced Functionality
22: Microsoft Internet Security
and Acceleration Server 2000 Overview
23: Microsoft
Internet Security and Acceleration Server 2000 Installation and
Configuration
24: Microsoft Internet Security and
Acceleration Server 2000 Advanced Functionality
25:
SonicWALL Firewall Background and Management
26:
SonicWALL Installation
27: SonicWALL
Configuration
28: SonicWALL Advanced
Configuration
29: NetScreen Firewall Background and
Management
30: NetScreen
Installation
31: NetScreen
Configuration
32: NetScreen Advanced
Configuration