Instant download Test Bank for Guide to Firewalls and VPNs, 3rd Edition pdf docx epub after payment.
Product details:
- ISBN-10 : 1111135398
- ISBN-13 : 978-1111135393
- Author: Michael E. Whitman; Herbert J. Mattord; Andrew Green
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving you a valuable opportunity to hone and apply your knowledge and skills. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals nationwide.
Table of contents:
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XV
PART 1
Introduction to Information Security
CHAPTER 1
Introduction to Information Security ………………………………………….. 1
CHAPTER 2
Security Policies and Standards …………………………………………….. 33
CHAPTER 3
Authenticating Users ……………………………………………………. 67
PART 2
Firewalls
CHAPTER 4
Introduction to Firewalls …………………………………………………. 97
CHAPTER 5
Packet Filtering……………………………………………………….. 143
CHAPTER 6
Firewall Configuration and Administration ……………………………………. 179
CHAPTER 7
Working with Proxy Servers and Application-Level Firewalls………………………… 209
CHAPTER 8
Implementing the Bastion Host ……………………………………………. 237
PART 3
VPNs
CHAPTER 9
Encryption—The Foundation for the Virtual Private Network ……………………….. 261
CHAPTER 10
Setting Up a Virtual Private Network………………………………………… 293
APPENDIX A
Setting Up and Operating a Software Firewall …………………………………. 323
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
INDEX. . . . . . . . . . . . . . . . . . . . .
People also search:
Guide to Firewalls and VPNs, 3rd Edition
Guide to Firewalls and VPNs, 3rd Edition pdf
Guide to Firewalls and VPNs
what is the difference between a vpn and a firewall
configuring a vpn client for secure file transfers
types of vpn in firewall