Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
| Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
| Autore | Shinder Thomas W |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
| Descrizione fisica | 1 online resource (1329 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
| Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
| Record Nr. | UNINA-9910456335803321 |
Shinder Thomas W
|
||
| Rockland, Mass., : Syngress, 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
| Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder |
| Autore | Shinder Thomas W |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
| Descrizione fisica | 1 online resource (1329 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
AmonCheri
ShimonskiRobert ShinderDebra Littlejohn |
| Soggetto topico |
Firewalls (Computer security)
Computer networks - Security measures |
| ISBN |
1-281-05615-4
9786611056155 0-08-047606-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index |
| Record Nr. | UNINA-9910780122503321 |
Shinder Thomas W
|
||
| Rockland, Mass., : Syngress, 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.]
| Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.] |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Burlington, Mass., : Syngress, c2007 |
| Descrizione fisica | 1 online resource (1164 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | ShinderThomas W |
| Soggetto topico |
Firewalls (Computer security)
Computer security |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-10010-2
9786611100100 0-08-055687-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology Central Configuration and the SmartDefense Web Site |
| Record Nr. | UNINA-9910458328903321 |
| Burlington, Mass., : Syngress, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.]
| Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.] |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Burlington, Mass., : Syngress, c2007 |
| Descrizione fisica | 1 online resource (1164 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | ShinderThomas W |
| Soggetto topico |
Firewalls (Computer security)
Computer security |
| ISBN |
1-281-10010-2
9786611100100 0-08-055687-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology Central Configuration and the SmartDefense Web Site |
| Record Nr. | UNINA-9910784871803321 |
| Burlington, Mass., : Syngress, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor
| The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor |
| Pubbl/distr/stampa | Rockland, MA : Syngress, c2003 |
| Descrizione fisica | xxxiv, 1293 p. : ill. ; 25 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) |
Shinder, Thomas W.
Carasik, Anne H. |
| Soggetto topico |
Firewalls (Computer security)
Computer security - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781931836906
1931836906 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003258869707536 |
| Rockland, MA : Syngress, c2003 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
| The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen |
| Autore | Hansteen Peter N. M |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco, : No Starch Press, c2008 |
| Descrizione fisica | 1 online resource (188 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
TCP/IP (Computer network protocol)
Firewalls (Computer security) |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-59327-232-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right. |
| Record Nr. | UNINA-9910458418303321 |
Hansteen Peter N. M
|
||
| San Francisco, : No Starch Press, c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
| The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen |
| Autore | Hansteen Peter N. M |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco, : No Starch Press, c2008 |
| Descrizione fisica | 1 online resource (188 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
TCP/IP (Computer network protocol)
Firewalls (Computer security) |
| ISBN | 1-59327-232-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right. |
| Record Nr. | UNINA-9910784631903321 |
Hansteen Peter N. M
|
||
| San Francisco, : No Starch Press, c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky
| Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky |
| Autore | Chapman, D. Brent |
| Pubbl/distr/stampa | Sebastopol, CA : O'Reilly & Associates, c1995 |
| Descrizione fisica | xxvi, 517 p. : ill. ; 24 cm |
| Disciplina | 005.8 |
| Altri autori (Persone) | Zwicky, Elizabeth D. |
| Soggetto topico | Firewalls (Computer security) |
| ISBN | 1565921240 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003294679707536 |
Chapman, D. Brent
|
||
| Sebastopol, CA : O'Reilly & Associates, c1995 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Check Point Next Generation with application intelligence security administration [electronic resource] / Chris Tobkin ; Daniel Kligerman, editor
| Check Point Next Generation with application intelligence security administration [electronic resource] / Chris Tobkin ; Daniel Kligerman, editor |
| Autore | Tobkin, Chris. |
| Pubbl/distr/stampa | Rockland, MA : Syngress, c2004 |
| Descrizione fisica | xxiv, 599 p. : ill. ; 24 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) | Kligerman, Daniel |
| Soggetto topico |
Computer networks - Security measures - Computer programs
Computer security - Computer programs Firewalls (Computer security) |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781932266894
1932266895 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003260859707536 |
Tobkin, Chris.
|
||
| Rockland, MA : Syngress, c2004 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Check Point NG VPN-1/Firewall-1 [[electronic resource] ] : advanced configuration and troubleshooting / / Jim Noble ...[et. a.]
| Check Point NG VPN-1/Firewall-1 [[electronic resource] ] : advanced configuration and troubleshooting / / Jim Noble ...[et. a.] |
| Pubbl/distr/stampa | Rockland, Mass., : Syngress, 2003 |
| Descrizione fisica | 1 online resource (641 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | NobleJim |
| Soggetto topico |
Computer security - Computer programs
Firewalls (Computer security) Computer networks - Security measures - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-05620-0
9786611056209 0-08-047646-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Contents; Foreword; Chapter 1 FW-1 NG Operational Changes; Chapter 2 Smart Clients; Chapter 3 Advanced Authentication; Chapter 4 Advanced VPN Concepts; Chapter 5 Advanced VPN Client Installations; Chapter 6 High Availability and Clustering; Chapter 7 SecurePlatform; Chapter 8 SmartCenter Management Server, High Availability and Failover, and SMART Clients; Chapter 9 Integration and Configuration of CVP / UFP; Chapter 10 SecureClient Packaging Tool; Chapter 11 SmartDefense; Chapter 12 SmartUpdate; Chapter 13 Performance Pack; Chapter 14 UserAuthority; Chapter 15 Firewall Troubleshooting
IndexRelated Titles |
| Record Nr. | UNINA-9910455463403321 |
| Rockland, Mass., : Syngress, 2003 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||