Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2006 |
Descrizione fisica | 1 online resource (513 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CantrellChris
HenmiAnne LucasMark SinghAbhishek |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07834-4
9786611078348 0-08-050651-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910451065903321 |
Rockland, MA, : Syngress, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2006 |
Descrizione fisica | 1 online resource (513 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CantrellChris
HenmiAnne LucasMark SinghAbhishek |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
ISBN |
1-281-07834-4
9786611078348 0-08-050651-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910784058303321 |
Rockland, MA, : Syngress, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|