Best damn Firewall book period
Debra Littlejohn Shinder, Thomas W. Shinder, Anne Carasik-Henmi, Robert J. Shimonski
Résumé
The Internets explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it, from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internets vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Ciscos PIX Firewall to Microsofts ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book.
- Introduction to Security, Firewalls, DMZs, and IDSs
- ISA Server
- PIX Firewalls
- Check Point NG and Nokia IP Series Appliances
- Linux and Solaris
- Intrusion Detection with Snort
Contents
- Introduction to Network Security & Firewalls 1
- Introduction to Information Security
- Firewall Concepts
- DMZ Concepts, Layout, and Conceptual Design
- Introduction to Intrusion Detection Systems
- Solaris & Linux Firewalls 125
- Implementing a Firewall with Ipchains and Iptables
- Maintaining Open Source Firewalls
- Configuring Solaris as a Secure Router and Firewall
- PIX Firewalls 239
- Introduction to PIX Firewalls
- Passing Traffic
- Advanced PIX Configurations
- Troubleshooting and Performance Monitoring
- Check Point NG and Nokia IP Series Appliances 419
- Installing and Configuring VPN-1/FireWall-1 Next Generation
- Using the Graphical Interface
- Creating a Security Policy
- Advanced Configurations
- Configuring Virtual Private Networks
- Overview of the Nokia Security Platform
- Configuring the Check Point Firewall
- Introducing the Voyager Web Interface
- Basic System Administration
- High Availability and Clustering
- ISA Server 811
- ISA Server Deployment Planning and Design
- ISA Server Installation
- Managing ISA Server
- Optimizing, Customizing, Integrating, and Backing Up ISA Server
- Troubleshooting ISA Server
- Advanced Server Publishing with ISA Server
- Protecting Mail Services with ISA Server
- Intrusion Detection 1181
- Introducing Snort
- Installing Snort
- Combining Firewalls and IDS
- Index
L'auteur - Debra Littlejohn Shinder
Debra Littlejohn Shinder, MSc, MCT, is an instructor and
trainer at Eastfield College in Dallas County, Texas. She
is also a technology consultant for TACteam: Training and
Consulting, which she co-owns with her husband Tom Shinder.
Debra authored Troubleshooting Windows 2000 TCP/lP
(Syngress) and has contributed to more than 10 other
Windows books published by Syngress and Osborne.
Debra Littlejohn Shinder (MCSE, MCP+I, MCT) est spécialiste
des technologies Microsoft.
Formatrice, elle intervient en tant que consultante auprès
des plus grandes entreprises de Dallas (dont Xerox, Lucent
Technologies, Fina Oil).
L'auteur - Thomas W. Shinder
Thomas W. Shinder et Debra Littlejohn Shinder (MCSE, MCP
+ I, MCT) sont specialistes des technologies Microsoft.
Tous deux formateurs, ils interviennent en tant que
consultants aupres des plus grandes entreprises de Dallas
(dont Xerox, Lucent Technologies, Fina Oil).
Thomas W. Shinder (MCSE, MCP+I, MCT) est spécialiste des
technologies Microsoft.
Formateur, il intervient en tant que consultant auprès des
plus grandes entreprises de Dallas (dont Xerox, Lucent
Technologies, Fina Oil).
L'auteur - Robert J. Shimonski
Robert J. Shimonski holds several industry certifications, including MCSE, CCNP, CCDP, Novell Master CNE, Nortel NNCSS, Network + , and others. He is a Lead Network and Security Engineer, a specialist in network infrastructure design, and the author of several computer books.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Debra Littlejohn Shinder, Thomas W. Shinder, Anne Carasik-Henmi, Robert J. Shimonski |
Parution | 28/10/2003 |
Nb. de pages | 1328 |
Format | 20 x 25 |
Couverture | Broché |
Poids | 2220g |
Intérieur | Noir et Blanc |
EAN13 | 9781931836906 |
ISBN13 | 978-1-931836-90-6 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Firewalls
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet