LEADER 00000cam a2200601Ia 4500 001 ocn162595020 003 OCoLC 005 20160527040954.2 006 m o d 007 cr cn||||||||| 008 070806s2005 ne a ob 001 0 eng d 019 70967856|a156908158|a441785424|a505145793|a606031738 |a648305545|a856961547 020 9781555582975 020 1555582974 020 0080491324|q(electronic book) 020 9780080491325|q(electronic book) 035 (OCoLC)162595020|z(OCoLC)70967856|z(OCoLC)156908158 |z(OCoLC)441785424|z(OCoLC)505145793|z(OCoLC)606031738 |z(OCoLC)648305545|z(OCoLC)856961547 037 98321:98323|bElsevier Science & Technology|nhttp:// www.sciencedirect.com 040 OPELS|beng|epn|cOPELS|dOKU|dOCLCQ|dNTG|dMERUC|dUBY|dE7B |dU5D|dIDEBK|dB24X7|dDEBBG|dN$T|dYDXCP|dOCLCQ|dOCLCF |dOCLCQ 049 RIDW 050 4 TK5105.59|b.V32 2005eb 072 7 COM|x060040|2bisacsh 072 7 COM|x043050|2bisacsh 072 7 COM|x053000|2bisacsh 082 04 005.8|222 090 TK5105.59|b.V32 2005eb 100 1 Vacca, John R.|0https://id.loc.gov/authorities/names/ n91039772 245 10 Firewalls :|bjumpstart for network and systems administrators /|cJohn R. Vacca, Scott Ellis. 264 1 Amsterdam ;|aBoston :|bElsevier Digital,|c[2005] 264 4 |c©2005 300 1 online resource (xxx, 418 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 504 Includes bibliographical references and index. 505 0 Firewalls : what are they? -- Type of firewall security policy -- Firewall types -- Choosing the right firewall -- Defense in depth : firewall topologies -- Installation preparation -- Firewall configuration -- Simple policy implementation -- Complex web services management -- Content filtering -- Publicly accessible servers implementation -- Architecture selection -- External servers protection -- Internal IP security threats : Beyond the firewall -- Network address translation deployment -- Privacy and authentication technology -- Tunneling : firewall-to-firewall -- Auditing and logging - - Firewall administration. 520 In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split -DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. Install and configure proxy-based and stateful-filtering firewalls Protect internal IP addresses with NAT and deploy a secure DNS architecture Develop an Internet/intranet security policy to protect your organization's systems and data Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures. 588 0 Print version record. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Firewalls (Computer security)|0https://id.loc.gov/ authorities/subjects/sh00006011 650 7 Firewalls (Computer security)|2fast|0https:// id.worldcat.org/fast/925719 655 4 Electronic books. 700 1 Ellis, Scott|q(Scott Raymond),|d1968-|0https://id.loc.gov/ authorities/names/n2004141878 776 08 |iPrint version:|aVacca, John R.|tFirewalls.|dAmsterdam ; Boston : Elsevier Digital, ©2005|z1555582974 |z9781555582975|w(DLC) 2004063211|w(OCoLC)56942207 856 40 |uhttps://rider.idm.oclc.org/login?url=http:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=195149|zOnline eBook. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading this eBook|uhttp:// guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20160615|cEBSCO|tebscoebooksacademic|lridw 994 92|bRID