Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
Autore | Shinder Thomas W |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
Descrizione fisica | 1 online resource (1329 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
Record Nr. | UNINA-9910456335803321 |
Shinder Thomas W | ||
Rockland, Mass., : Syngress, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
Autore | Shinder Thomas W |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
Descrizione fisica | 1 online resource (1329 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
Record Nr. | UNINA-9910780122503321 |
Shinder Thomas W | ||
Rockland, Mass., : Syngress, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period / / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
Autore | Shinder Thomas W |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
Descrizione fisica | 1 online resource (1329 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
Record Nr. | UNINA-9910810207903321 |
Shinder Thomas W | ||
Rockland, Mass., : Syngress, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.] |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Burlington, Mass., : Syngress, c2007 |
Descrizione fisica | 1 online resource (1164 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ShinderThomas W |
Soggetto topico |
Firewalls (Computer security)
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-10010-2
9786611100100 0-08-055687-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology Central Configuration and the SmartDefense Web Site |
Record Nr. | UNINA-9910458328903321 |
Burlington, Mass., : Syngress, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.] |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Burlington, Mass., : Syngress, c2007 |
Descrizione fisica | 1 online resource (1164 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ShinderThomas W |
Soggetto topico |
Firewalls (Computer security)
Computer security |
ISBN |
1-281-10010-2
9786611100100 0-08-055687-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology Central Configuration and the SmartDefense Web Site |
Record Nr. | UNINA-9910784871803321 |
Burlington, Mass., : Syngress, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Best damn firewall book period / / T.W. Shinder ... [et al.] |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Burlington, Mass., : Syngress, c2007 |
Descrizione fisica | 1 online resource (1164 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | ShinderThomas W |
Soggetto topico |
Firewalls (Computer security)
Computer security |
ISBN |
1-281-10010-2
9786611100100 0-08-055687-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology Central Configuration and the SmartDefense Web Site |
Record Nr. | UNINA-9910819459403321 |
Burlington, Mass., : Syngress, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor |
Pubbl/distr/stampa | Rockland, MA : Syngress, c2003 |
Descrizione fisica | xxxiv, 1293 p. : ill. ; 25 cm. |
Disciplina | 005.8 |
Altri autori (Persone) |
Shinder, Thomas W.
Carasik, Anne H. |
Soggetto topico |
Firewalls (Computer security)
Computer security - Computer programs |
Soggetto genere / forma | Electronic books. |
ISBN |
9781931836906
1931836906 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991003258869707536 |
Rockland, MA : Syngress, c2003 | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen |
Autore | Hansteen Peter N. M |
Edizione | [1st edition] |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2008 |
Descrizione fisica | 1 online resource (188 p.) |
Disciplina | 005.8 |
Soggetto topico |
TCP/IP (Computer network protocol)
Firewalls (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN | 1-59327-232-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right. |
Record Nr. | UNINA-9910458418303321 |
Hansteen Peter N. M | ||
San Francisco, : No Starch Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen |
Autore | Hansteen Peter N. M |
Edizione | [1st edition] |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2008 |
Descrizione fisica | 1 online resource (188 p.) |
Disciplina | 005.8 |
Soggetto topico |
TCP/IP (Computer network protocol)
Firewalls (Computer security) |
ISBN | 1-59327-232-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right. |
Record Nr. | UNINA-9910784631903321 |
Hansteen Peter N. M | ||
San Francisco, : No Starch Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The book of PF : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen |
Autore | Hansteen Peter N. M |
Edizione | [1st edition] |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2008 |
Descrizione fisica | 1 online resource (188 p.) |
Disciplina | 005.8 |
Soggetto topico |
TCP/IP (Computer network protocol)
Firewalls (Computer security) |
ISBN | 1-59327-232-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right. |
Record Nr. | UNINA-9910822263803321 |
Hansteen Peter N. M | ||
San Francisco, : No Starch Press, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|