LEADER 03013nam 2200589Ia 450 001 9910780468303321 005 20230120004042.0 010 $a1-281-05614-6 010 $a9786611056148 010 $a0-08-047626-0 035 $a(CKB)111087028318874 035 $a(EBL)294015 035 $a(OCoLC)191034910 035 $a(SSID)ssj0000115674 035 $a(PQKBManifestationID)11145709 035 $a(PQKBTitleCode)TC0000115674 035 $a(PQKBWorkID)10026145 035 $a(PQKB)11536451 035 $a(MiAaPQ)EBC294015 035 $a(Au-PeEL)EBL294015 035 $a(CaPaEBR)ebr10044830 035 $a(CaONFJC)MIL105614 035 $a(EXLCZ)99111087028318874 100 $a20030717d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aBuilding DMZs for Enterprise networks$b[electronic resource] /$fRobert J. Shimonski ... [et al.] 210 $aRockland, Mass. $cSyngress$dc2003 215 $a1 online resource (831 p.) 300 $aIncludes index. 311 $a1-931836-88-4 327 $aCover; Contents; Foreword; Chapter 1 DMZ Concepts, Layout, and Conceptual Design; Chapter 2 Windows 2000 DMZ Design; Chapter 3 Sun Solaris DMZ Design; Chapter 4 Wireless DMZs; Chapter 5 Firewall Design: Cisco PIX; Chapter 6 Firewall and DMZ Design: Check Point NG; Chapter 7 Firewall and DMZ Design: Nokia Firewall; Chapter 8 Firewall and DMZ Design: ISA Server 2000; Chapter 9 DMZ Router and Switch Security; Chapter 10 DMZ-Based VPN Services; Chapter 11 Implementing Wireless DMZs; Chapter 12 Sun Solaris Bastion Hosts; Chapter 13 Windows 2000 Bastion Hosts; Chapter 14 Hacking the DMZ 327 $aChapter 15 Intrusion Detection in the DMZAppendix A IIS Web Server Hardening; Index; Related Titles 330 $aThis book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.- 606 $aComputer networks$xAccess control 606 $aComputer networks$xSecurity measures 606 $aWide area networks (Computer networks)$xAccess 615 0$aComputer networks$xAccess control. 615 0$aComputer networks$xSecurity measures. 615 0$aWide area networks (Computer networks)$xAccess. 676 $a005.8 701 $aShimonski$b Robert$0627583 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910780468303321 996 $aBuilding DMZs for Enterprise networks$93708765 997 $aUNINA