Firewalls
Jumpstart for Network and Systems Administrators
John R. Vacca, Scott R. Ellis - Collection Computing - Security
Résumé
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
- Install and configure proxy-based and stateful-filtering firewalls
- Protect internal IP addresses with NAT and deploy a secure DNS architecture
- Develop an Internet/intranet security policy to protect your organization's systems and data
- Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures
L'auteur - John R. Vacca
John R. Vacca is an Information Technology and
Air-and-Space Freelance Research Contract Writer/Consultant
based in Houston. Since 1982, John has authored and
published over 300 articles and 13 books in the areas of
programming, systems development,
multimedia, and the Internet. His articles have appeared in
hundreds of magazines including Byte, Internet World, and
Computer World. John was also a configuration management
specialist, computer specialist, and the computer security
official for
NASA's space station program (Freedom) and the Alpha
program, from 1988 until his early retirement from NASA in
1995.
L'auteur - Scott R. Ellis
Scott R. Ellis is an independant IT consultant based in Chicago.
Sommaire
- Overview of Firewall Technology
- Firewalls: What Are They?
- Type Of Security Policy
- Firewall Types
- Firewall Topologies
- Choosing The Right Firewall
- Firewall Topologies
- Firewall Installation and Configuration
- Installation Preparation
- Firewall Configuration
- Supporting Outgoing Services Through Firewall Configuration
- Simple Policy Implementation
- Complex Services Management
- Filtering Content
- Secure External Services Provision
- Publicly Accessible Servers Implementation
- Architecture Selection
- External Servers Protection
- Internal IP Services Protection
- Internal IP Security Threats : Beyond the Firewall
- Network Address Translation Deployment
- Firewall Remote Access Configuration
- Privacy and Authentification Technology
- Tunneling: Firewall-to-Firewall
- Firewall Management
- Auditing And Logging
- Firewall Administration
- Summary, Conclusions, and Recommendations
- Appendixes
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Elsevier |
Auteur(s) | John R. Vacca, Scott R. Ellis |
Collection | Computing - Security |
Parution | 28/01/2005 |
Nb. de pages | 418 |
Format | 19 x 23,5 |
Couverture | Broché |
Poids | 913g |
Intérieur | Noir et Blanc |
EAN13 | 9781555582975 |
ISBN13 | 978-1-55558-297-5 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Firewalls
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet