LEADER 03854nam 2200625Ia 450 001 9910456335803321 005 20200520144314.0 010 $a1-281-05615-4 010 $a9786611056155 010 $a0-08-047606-6 035 $a(CKB)111086906342802 035 $a(EBL)294396 035 $a(OCoLC)54360256 035 $a(SSID)ssj0000110458 035 $a(PQKBManifestationID)11141174 035 $a(PQKBTitleCode)TC0000110458 035 $a(PQKBWorkID)10064252 035 $a(PQKB)10661258 035 $a(MiAaPQ)EBC294396 035 $a(Au-PeEL)EBL294396 035 $a(CaPaEBR)ebr10044829 035 $a(CaONFJC)MIL105615 035 $a(EXLCZ)99111086906342802 100 $a20020409d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBest damn firewall book period$b[electronic resource] /$fThomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder 210 $aRockland, Mass. $cSyngress$d2003 215 $a1 online resource (1329 p.) 300 $aIncludes index. 311 $a1-931836-90-6 327 $aCOVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring 327 $aChapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server 327 $aChapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index 330 $aThis book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, 606 $aFirewalls (Computer security) 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aFirewalls (Computer security) 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aShinder$b Thomas W$0627558 701 $aAmon$b Cheri$0897931 701 $aShimonski$b Robert$0627583 701 $aShinder$b Debra Littlejohn$0627588 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910456335803321 996 $aBest damn firewall book period$92006239 997 $aUNINA