Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
Autore | Shinder Thomas W |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
Descrizione fisica | 1 online resource (1329 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
Record Nr. | UNINA-9910456335803321 |
Shinder Thomas W | ||
Rockland, Mass., : Syngress, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
Autore | Shinder Thomas W |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
Descrizione fisica | 1 online resource (1329 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
Record Nr. | UNINA-9910780122503321 |
Shinder Thomas W | ||
Rockland, Mass., : Syngress, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period / / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
Autore | Shinder Thomas W |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
Descrizione fisica | 1 online resource (1329 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
Record Nr. | UNINA-9910810207903321 |
Shinder Thomas W | ||
Rockland, Mass., : Syngress, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BizTalk Server 2000 [[electronic resource] ] : developer's guide for .Net / / Robert Shimonski ... [et al.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2002 |
Descrizione fisica | 1 online resource (545 p.) |
Disciplina | 658.054678 |
Altri autori (Persone) | ShimonskiRobert |
Soggetto topico |
Client/server computing
XML (Document markup language) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05291-4
9786611052911 0-08-047611-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1928994407.pdf; 1928994407.pdf; Cover; Table of Contents; Foreword; Chapter 1 The Role of BizTalk in the .NET Server Family; Chapter 2 Planning an Installation of BizTalk 2000; Chapter 3 Testing the Installation; Chapter 4 Understanding BizTalk Messaging Services; Chapter 5 Specifications and Mapping; Chapter 6 Tracking and Receipts; Chapter 7 BizTalk Orchestration Services; Chapter 8 Security; Chapter 9 Performance and Monitoring; Chapter 10 Troubleshooting; Index; Related Titles |
Altri titoli varianti | Developer's guide for .Net |
Record Nr. | UNINA-9910456055203321 |
Rockland, MA, : Syngress Publishing, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BizTalk Server 2000 [[electronic resource] ] : developer's guide for .Net / / Robert Shimonski ... [et al.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2002 |
Descrizione fisica | 1 online resource (545 p.) |
Disciplina | 658.054678 |
Altri autori (Persone) | ShimonskiRobert |
Soggetto topico |
Client/server computing
XML (Document markup language) |
ISBN |
1-281-05291-4
9786611052911 0-08-047611-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1928994407.pdf; 1928994407.pdf; Cover; Table of Contents; Foreword; Chapter 1 The Role of BizTalk in the .NET Server Family; Chapter 2 Planning an Installation of BizTalk 2000; Chapter 3 Testing the Installation; Chapter 4 Understanding BizTalk Messaging Services; Chapter 5 Specifications and Mapping; Chapter 6 Tracking and Receipts; Chapter 7 BizTalk Orchestration Services; Chapter 8 Security; Chapter 9 Performance and Monitoring; Chapter 10 Troubleshooting; Index; Related Titles |
Altri titoli varianti | Developer's guide for .Net |
Record Nr. | UNINA-9910780154503321 |
Rockland, MA, : Syngress Publishing, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BizTalk Server 2000 : developer's guide for .Net / / Robert Shimonski ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2002 |
Descrizione fisica | 1 online resource (545 p.) |
Disciplina |
658.054678
005.376 |
Altri autori (Persone) | ShimonskiRobert |
Soggetto topico |
Client/server computing
XML (Document markup language) |
ISBN |
1-281-05291-4
9786611052911 0-08-047611-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1928994407.pdf; 1928994407.pdf; Cover; Table of Contents; Foreword; Chapter 1 The Role of BizTalk in the .NET Server Family; Chapter 2 Planning an Installation of BizTalk 2000; Chapter 3 Testing the Installation; Chapter 4 Understanding BizTalk Messaging Services; Chapter 5 Specifications and Mapping; Chapter 6 Tracking and Receipts; Chapter 7 BizTalk Orchestration Services; Chapter 8 Security; Chapter 9 Performance and Monitoring; Chapter 10 Troubleshooting; Index; Related Titles |
Altri titoli varianti | Developer's guide for .Net |
Record Nr. | UNINA-9910809529603321 |
Rockland, MA, : Syngress Publishing, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building DMZs for Enterprise networks [[electronic resource] /] / Robert J. Shimonski ... [et al.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (831 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ShimonskiRobert |
Soggetto topico |
Computer networks - Access control
Computer networks - Security measures Wide area networks (Computer networks) - Access |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05614-6
9786611056148 0-08-047626-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 DMZ Concepts, Layout, and Conceptual Design; Chapter 2 Windows 2000 DMZ Design; Chapter 3 Sun Solaris DMZ Design; Chapter 4 Wireless DMZs; Chapter 5 Firewall Design: Cisco PIX; Chapter 6 Firewall and DMZ Design: Check Point NG; Chapter 7 Firewall and DMZ Design: Nokia Firewall; Chapter 8 Firewall and DMZ Design: ISA Server 2000; Chapter 9 DMZ Router and Switch Security; Chapter 10 DMZ-Based VPN Services; Chapter 11 Implementing Wireless DMZs; Chapter 12 Sun Solaris Bastion Hosts; Chapter 13 Windows 2000 Bastion Hosts; Chapter 14 Hacking the DMZ
Chapter 15 Intrusion Detection in the DMZAppendix A IIS Web Server Hardening; Index; Related Titles |
Record Nr. | UNINA-9910456072303321 |
Rockland, Mass., : Syngress, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building DMZs for Enterprise networks [[electronic resource] /] / Robert J. Shimonski ... [et al.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (831 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ShimonskiRobert |
Soggetto topico |
Computer networks - Access control
Computer networks - Security measures Wide area networks (Computer networks) - Access |
ISBN |
1-281-05614-6
9786611056148 0-08-047626-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 DMZ Concepts, Layout, and Conceptual Design; Chapter 2 Windows 2000 DMZ Design; Chapter 3 Sun Solaris DMZ Design; Chapter 4 Wireless DMZs; Chapter 5 Firewall Design: Cisco PIX; Chapter 6 Firewall and DMZ Design: Check Point NG; Chapter 7 Firewall and DMZ Design: Nokia Firewall; Chapter 8 Firewall and DMZ Design: ISA Server 2000; Chapter 9 DMZ Router and Switch Security; Chapter 10 DMZ-Based VPN Services; Chapter 11 Implementing Wireless DMZs; Chapter 12 Sun Solaris Bastion Hosts; Chapter 13 Windows 2000 Bastion Hosts; Chapter 14 Hacking the DMZ
Chapter 15 Intrusion Detection in the DMZAppendix A IIS Web Server Hardening; Index; Related Titles |
Record Nr. | UNINA-9910780468303321 |
Rockland, Mass., : Syngress, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building DMZs for Enterprise networks / / Robert J. Shimonski ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (831 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ShimonskiRobert |
Soggetto topico |
Computer networks - Access control
Computer networks - Security measures Wide area networks (Computer networks) - Access |
ISBN |
1-281-05614-6
9786611056148 0-08-047626-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 DMZ Concepts, Layout, and Conceptual Design; Chapter 2 Windows 2000 DMZ Design; Chapter 3 Sun Solaris DMZ Design; Chapter 4 Wireless DMZs; Chapter 5 Firewall Design: Cisco PIX; Chapter 6 Firewall and DMZ Design: Check Point NG; Chapter 7 Firewall and DMZ Design: Nokia Firewall; Chapter 8 Firewall and DMZ Design: ISA Server 2000; Chapter 9 DMZ Router and Switch Security; Chapter 10 DMZ-Based VPN Services; Chapter 11 Implementing Wireless DMZs; Chapter 12 Sun Solaris Bastion Hosts; Chapter 13 Windows 2000 Bastion Hosts; Chapter 14 Hacking the DMZ
Chapter 15 Intrusion Detection in the DMZAppendix A IIS Web Server Hardening; Index; Related Titles |
Altri titoli varianti | DMZs for Enterprise networks |
Record Nr. | UNINA-9910809989603321 |
Rockland, Mass., : Syngress, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Configuring Symantec Antivirus, Corporate Edition [[electronic resource] /] / Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, c2003 |
Descrizione fisica | 1 online resource (753 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
HunterLaura E
ShimonskiRobert |
Soggetto topico |
Computer viruses
Computer security Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05611-1
9786611056117 0-08-047671-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 Introduction To Norton AntiVirus Corporate Edition (NAVCE); Chapter 2 Designing a Managed Antivirus Infrastructure; Chapter 3 Implementing Symantec System Center and Alert Management System2 (AMS2); Chapter 4 Implementing Central Quarantine 2.01; Chapter 5 Implementing NAVCE 7.6 to Servers; Chapter 6 Implementing NAVCE 7.6 to Client PCs; Chapter 7 Upgrading from Prior Versions; Chapter 8 Configuring Your NAVCE 7.6 Environment; Chapter 9 Securing Your NAVCE 7.6 Environment; Chapter 10 Updating Virus Protection
Chapter 11 Troubleshooting Your NAVCE 7.6 EnvironmentChapter 12 Scanning for Viruses and Handling Virus Outbreaks; Chapter 13 Backup and Disaster Recovery; Appendix A Norton AntiVirus 2003 and 2003 Professional Edition; Index |
Record Nr. | UNINA-9910456347003321 |
Rockland, Mass., : Syngress, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|