Skip to content
You are not logged in |Login  

LEADER 00000cam a2200601Ia 4500 
001    ocn162595020 
003    OCoLC 
005    20160527040954.2 
006    m     o  d         
007    cr cn||||||||| 
008    070806s2005    ne a    ob    001 0 eng d 
019    70967856|a156908158|a441785424|a505145793|a606031738
       |a648305545|a856961547 
020    9781555582975 
020    1555582974 
020    0080491324|q(electronic book) 
020    9780080491325|q(electronic book) 
035    (OCoLC)162595020|z(OCoLC)70967856|z(OCoLC)156908158
       |z(OCoLC)441785424|z(OCoLC)505145793|z(OCoLC)606031738
       |z(OCoLC)648305545|z(OCoLC)856961547 
037    98321:98323|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
040    OPELS|beng|epn|cOPELS|dOKU|dOCLCQ|dNTG|dMERUC|dUBY|dE7B
       |dU5D|dIDEBK|dB24X7|dDEBBG|dN$T|dYDXCP|dOCLCQ|dOCLCF
       |dOCLCQ 
049    RIDW 
050  4 TK5105.59|b.V32 2005eb 
072  7 COM|x060040|2bisacsh 
072  7 COM|x043050|2bisacsh 
072  7 COM|x053000|2bisacsh 
082 04 005.8|222 
090    TK5105.59|b.V32 2005eb 
100 1  Vacca, John R.|0https://id.loc.gov/authorities/names/
       n91039772 
245 10 Firewalls :|bjumpstart for network and systems 
       administrators /|cJohn R. Vacca, Scott Ellis. 
264  1 Amsterdam ;|aBoston :|bElsevier Digital,|c[2005] 
264  4 |c©2005 
300    1 online resource (xxx, 418 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
504    Includes bibliographical references and index. 
505 0  Firewalls : what are they? -- Type of firewall security 
       policy -- Firewall types -- Choosing the right firewall --
       Defense in depth : firewall topologies -- Installation 
       preparation -- Firewall configuration -- Simple policy 
       implementation -- Complex web services management -- 
       Content filtering -- Publicly accessible servers 
       implementation -- Architecture selection -- External 
       servers protection -- Internal IP security threats : 
       Beyond the firewall -- Network address translation 
       deployment -- Privacy and authentication technology -- 
       Tunneling : firewall-to-firewall -- Auditing and logging -
       - Firewall administration. 
520    In this book, you will gain extensive hands-on experience 
       installing and configuring a firewall. You will also learn
       how to allow access to key Web services while maintaining 
       your organization's security, as well as how to implement 
       firewall-to-firewall virtual private networks (VPNs). You 
       will learn how to build a firewall to protect your 
       network; provide access to HTTP and FTP services on the 
       Internet, and implement publicly accessible servers 
       without compromising security. Furthermore, throughout the
       book, extensive hands-on examples provide you with 
       practical experience in establishing security with 
       firewalls. Examples include, but are not limited to: 
       Installing and configuring Check Point FireWall-1; 
       scanning to validate configuration using ISS Internet 
       Scanner; configuring the firewall to support simple and 
       complex Web services; setting up a packet filtering 
       router; enhancing firewall configurations to support split
       -DNS; authenticating remote users; and protecting browsers
       and servers with a proxy-based firewall. Install and 
       configure proxy-based and stateful-filtering firewalls 
       Protect internal IP addresses with NAT and deploy a secure
       DNS architecture Develop an Internet/intranet security 
       policy to protect your organization's systems and data 
       Reduce your susceptibility to an attack by deploying 
       firewalls, data encryption and decryption and other 
       countermeasures. 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Firewalls (Computer security)|0https://id.loc.gov/
       authorities/subjects/sh00006011 
650  7 Firewalls (Computer security)|2fast|0https://
       id.worldcat.org/fast/925719 
655  4 Electronic books. 
700 1  Ellis, Scott|q(Scott Raymond),|d1968-|0https://id.loc.gov/
       authorities/names/n2004141878 
776 08 |iPrint version:|aVacca, John R.|tFirewalls.|dAmsterdam ; 
       Boston : Elsevier Digital, ©2005|z1555582974
       |z9781555582975|w(DLC)  2004063211|w(OCoLC)56942207 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=195149|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20160615|cEBSCO|tebscoebooksacademic|lridw 
994    92|bRID