03821nam 2200613Ia 450 991078012250332120230120003909.01-281-05615-497866110561550-08-047606-6(CKB)111086906342802(EBL)294396(OCoLC)54360256(SSID)ssj0000110458(PQKBManifestationID)11141174(PQKBTitleCode)TC0000110458(PQKBWorkID)10064252(PQKB)10661258(MiAaPQ)EBC294396(Au-PeEL)EBL294396(CaPaEBR)ebr10044829(CaONFJC)MIL105615(EXLCZ)9911108690634280220020409d2003 uy 0engur|n|---|||||txtccrBest damn firewall book period[electronic resource] /Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn ShinderRockland, Mass. Syngress20031 online resource (1329 p.)Includes index.1-931836-90-6 COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance MonitoringChapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA ServerChapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; IndexThis book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ,Firewalls (Computer security)Computer networksSecurity measuresFirewalls (Computer security)Computer networksSecurity measures.005.8Shinder Thomas W627558Amon Cheri1473281Shimonski Robert627583Shinder Debra Littlejohn627588MiAaPQMiAaPQMiAaPQBOOK9910780122503321Best damn firewall book period3686364UNINA