Firewalls: The Complete Reference
暫譯: 防火牆:完整參考指南
Keith Strassberg, Gary Rollie, Richard Gondek
- 出版商: McGraw-Hill Education
- 出版日期: 2002-05-28
- 售價: $2,250
- 貴賓價: 9.5 折 $2,138
- 語言: 英文
- 頁數: 960
- 裝訂: Paperback
- ISBN: 0072195673
- ISBN-13: 9780072195675
已過版
買這商品的人也買了...
-
$888Building Linux Clusters: Scaling Linux for Scientific and Enterprise Application (Paperback)
-
$680$537 -
$990Solaris Internals: Core Kernel Architecture
-
$2,120$2,014 -
$750Cisco Secure Intrusion Detection System (Hardcover)
-
$1,710$1,625 -
$399RHCE Red Hat Certified Engineer LINUX Study Guide, 2/e (Hardcover)
-
$888Component Development for the Java Platform (Paperback)
-
$1,710$1,625 -
$490$387 -
$350Faster Smarter Beginning Programming
-
$525Itanium Rising: Breaking Through Moore's Second Law of Computing Power
-
$560$476 -
$1,900$1,805 -
$750$638 -
$420$328 -
$750$638 -
$580$458 -
$590$466 -
$650$514 -
$750$638 -
$560$476 -
$299$254 -
$2,390$2,271 -
$550$429
相關主題
商品描述
The Most Comprehensive Firewalls Resource Available
Get in-depth, objective advice on installing and configuring todays most popular firewalls including Check PointTM Firewall-1® 4.1 and NG, Cisco® PIX, Microsoft® ISA Server, NetScreenTM, SonicWall and SymantecTM --and learn strategies for successful network design and firewall placement. Gain insight into common methods for attacking firewalls--including software bugs, viruses, and misconfigurations. Learn firewall best practices and how to improve the overall security of your firewall installation. This multipurpose guide contains all the implementation and administration information you need to keep your network safe from unauthorized access.
- Restrict access to your network without compromising usability and
functionality
- Understand the strengths and limitations of firewall technology
- Get in-depth explanations of network and port address translation, VPNs,
authentication, virus protection, content filtering, and more
- Learn about the various architectures available today--application and
circuit-level gateways, packet filters, and stateful packet inspection engines
- Find out how hackers commonly go about breaking into a network
- Get details on platforms and features for key products from Check
PointTM, Cisco®,
SymantecTM, Microsoft®, and others
- Manage your firewall installation using built-in tools, objects, and
services
- Supplement your firewall system by implementing human controls such as
education and log monitoring
- Understand the details of implementing the Cisco Secure Policy Manager
- Learn the latest on Check Point NG Firewall-1, CiscoTM IOS Firewall Feature Set, and Linux IP Tables
Contents
1: Introduction
2: TCP/IP
Fundamentals for Firewall Administrators
3: Network
Design Considerations
4: Firewall
Architectures
5: Advanced Firewall
Functionality
6: Hacking the
Firewall
7: Check Point FireWall-1
Overview
8: FireWall-1
Installation
9: FireWall-1
Configuration
10: FireWall-1 Advanced
Functionality
11: Check Point Next
Generation
12: Cisco Private Internet Exchange
(PIX)
13: Cisco PIX Installation
14: Cisco PIX Configuration
15: Cisco PIX Advanced
Functionality
16: Cisco Secure Policy
Manager
17: Cisco IOS Firewall Feature
Set
18: Linux Kernel
Firewalls-Iptables
19: Symantec Enterprise Firewall
Background and Installation
20: Symantec Enterprise
Firewall Configuration
21: Symantec Enterprise Firewall
Advanced Functionality
22: Microsoft Internet Security
and Acceleration Server 2000 Overview
23: Microsoft
Internet Security and Acceleration Server 2000 Installation and
Configuration
24: Microsoft Internet Security and
Acceleration Server 2000 Advanced Functionality
25:
SonicWALL Firewall Background and Management
26:
SonicWALL Installation
27: SonicWALL
Configuration
28: SonicWALL Advanced
Configuration
29: NetScreen Firewall Background and
Management
30: NetScreen
Installation
31: NetScreen
Configuration
32: NetScreen Advanced
Configuration
商品描述(中文翻譯)
最全面的防火牆資源
獲得有關安裝和配置當今最受歡迎的防火牆的深入、客觀建議,包括 Check Point™ Firewall-1® 4.1 和 NG、Cisco® PIX、Microsoft® ISA Server、NetScreen™、SonicWall 和 Symantec™,並學習成功的網路設計和防火牆佈局策略。深入了解攻擊防火牆的常見方法,包括軟體漏洞、病毒和錯誤配置。學習防火牆最佳實踐以及如何改善防火牆安裝的整體安全性。本多用途指南包含所有您需要的實施和管理資訊,以保護您的網路免受未經授權的訪問。
- 在不妨礙可用性和功能性的情況下限制對您的網路的訪問
- 了解防火牆技術的優勢和限制
- 獲得有關網路和端口地址轉換、VPN、身份驗證、病毒保護、內容過濾等的深入解釋
- 了解當今可用的各種架構——應用程式和電路層閘道、封包過濾器和狀態封包檢查引擎
- 瞭解駭客通常如何入侵網路
- 獲取有關 Check Point™、Cisco®、Symantec™、Microsoft® 等主要產品的平台和功能的詳細資訊
- 使用內建工具、物件和服務管理您的防火牆安裝
- 通過實施人為控制(如教育和日誌監控)來補充您的防火牆系統
- 了解實施 Cisco Secure Policy Manager 的詳細資訊
- 瞭解有關 Check Point NG Firewall-1、Cisco™ IOS 防火牆功能集和 Linux IP Tables 的最新資訊
目錄
1: 介紹
2: 防火牆管理員的 TCP/IP 基礎
3: 網路設計考量
4: 防火牆架構
5: 進階防火牆功能
6: 破解防火牆
7: Check Point FireWall-1 概述
8: FireWall-1 安裝
9: FireWall-1 配置
10: FireWall-1 進階功能
11: Check Point 下一代
12: Cisco 私人網際網路交換 (PIX)
13: Cisco PIX 安裝
14: Cisco PIX 配置
15: Cisco PIX 進階功能
16: Cisco Secure Policy Manager
17: Cisco IOS 防火牆功能集
18: Linux 核心防火牆 - Iptables
19: Symantec 企業防火牆背景和安裝
20: Symantec 企業防火牆配置
21: Symantec 企業防火牆進階功能
22: Microsoft 網際網路安全與加速伺服器 2000 概述
23: Microsoft 網際網路安全與加速伺服器 2000 安裝和配置
24: Microsoft 網際網路安全與加速伺服器 2000 進階功能
25: SonicWALL 防火牆背景和管理
26: SonicWALL 安裝
27: SonicWALL 配置
28: SonicWALL 進階配置
29: NetScreen 防火牆背景和管理
30: NetScreen 安裝
31: NetScreen 配置
32: NetScreen 進階配置