CART

(0) items

Guide to Firewalls and Network Security : Intrusion Detection and VPNs,9780619130398
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Guide to Firewalls and Network Security : Intrusion Detection and VPNs

by
Edition:
1st
ISBN13:

9780619130398

ISBN10:
0619130393
Format:
Paperback
Pub. Date:
7/9/2003
Publisher(s):
Cengage Learning
List Price: $210.99
More New and Used
from Private Sellers
Starting at $0.01

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Firewalls and Network Security : Intrusion Detection and Vpns
    Firewalls and Network Security : Intrusion Detection and Vpns
  • Guide to Firewalls and Network Security
    Guide to Firewalls and Network Security




Summary

This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an intelligent choice of firewall technology, and presents basic firewall troubleshooting. It contains pedagogical features including chapter review questions, hands-on exercises and case projects that allow the reader to practice skills as they are learned. In addition, this text maps to the CheckPoint CCSA Certification.

Author Biography

Greg Holden has developed a following through his ability to teach highly technical subjects to novice and experienced computer users alike. He has written various books

Table of Contents

INTRODUCTION xiii
CHAPTER ONE Firewall Planning and Design 1(36)
CHAPTER TWO Developing a Security Policy 37(24)
CHAPTER THREE Firewall Configuration Strategies 61(40)
CHAPTER FOUR Packet Filtering 101(34)
CHAPTER FIVE Working with Proxy Servers and Application-Level Firewalls 135(36)
CHAPTER SIX Authenticating Users 171(32)
CHAPTER SEVEN Encryption and Firewalls 203(40)
CHAPTER EIGHT Choosing a Bastion Host 243(34)
CHAPTER NINE Setting Up a Virtual Private Network 277(42)
CHAPTER TEN Building Your Own Firewall 319(38)
CHAPTER ELEVEN Ongoing Administration 357(36)
APPENDIX A Security Resources 393(8)
GLOSSARY 401(12)
INDEX 413


Please wait while the item is added to your cart...