top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
Autore Shinder Thomas W
Pubbl/distr/stampa Rockland, Mass., : Syngress, 2003
Descrizione fisica 1 online resource (1329 p.)
Disciplina 005.8
Altri autori (Persone) AmonCheri
ShimonskiRobert
ShinderDebra Littlejohn
Soggetto topico Firewalls (Computer security)
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-05615-4
9786611056155
0-08-047606-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server
Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index
Record Nr. UNINA-9910456335803321
Shinder Thomas W  
Rockland, Mass., : Syngress, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
Best damn firewall book period [[electronic resource] /] / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
Autore Shinder Thomas W
Pubbl/distr/stampa Rockland, Mass., : Syngress, 2003
Descrizione fisica 1 online resource (1329 p.)
Disciplina 005.8
Altri autori (Persone) AmonCheri
ShimonskiRobert
ShinderDebra Littlejohn
Soggetto topico Firewalls (Computer security)
Computer networks - Security measures
ISBN 1-281-05615-4
9786611056155
0-08-047606-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server
Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index
Record Nr. UNINA-9910780122503321
Shinder Thomas W  
Rockland, Mass., : Syngress, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Best damn firewall book period / / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
Best damn firewall book period / / Thomas W. Shinder, Cheri Amon, Robert J. Shimonski, Debra Littlejohn Shinder
Autore Shinder Thomas W
Edizione [1st ed.]
Pubbl/distr/stampa Rockland, Mass., : Syngress, 2003
Descrizione fisica 1 online resource (1329 p.)
Disciplina 005.8
Altri autori (Persone) AmonCheri
ShimonskiRobert
ShinderDebra Littlejohn
Soggetto topico Firewalls (Computer security)
Computer networks - Security measures
ISBN 1-281-05615-4
9786611056155
0-08-047606-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COVER; Contents; Foreword; Chapter 1 Introduction to Information Security; Chapter 2 Firewall Concepts; Chapter 3 DMZ Concepts, Layout, and Conceptual Design; Chapter 4 Introduction to Intrusion Detection Systems; Implementing a Firewall with Ipchains and Iptables; Chapter 6 Maintaining Open Source Firewalls; Chapter 7 Configuring Solaris as a Secure Router and Firewall; Chapter 8 Introduction to PIX Firewalls; Chapter 9 Passing Traffic; Chapter 10 Advanced PIX Configurations; Chapter 11 Troubleshooting and Performance Monitoring
Chapter 12 Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 13 Using the Graphical Interface; Chapter 14 Creating a Security Policy; Chapter 15 Advanced Configurations; Chapter 16 Configuring Virtual Private Networks; Chapter 17 Overview of the Nokia Security Platform; Chapter 18 Configuring the Check Point Firewall; Chapter 19 Introducing the Voyager Web Interface; Chapter 20 Basic System Administration; Chapter 21 High Availability and Clustering; Chapter 22 ISA Server Deployment Planning and Design; Chapter 23 ISA Server Installation; Chapter 24 Managing ISA Server
Chapter 25 Optimizing, Customizing, Integrating, and Backing Up ISA ServerChapter 26 Troubleshooting ISA Server; Chapter 27 Advanced Server Publishing with ISA Server; Chapter 28 Protecting Mail Services with ISA Server; Chapter 29 Introducing Snort; Chapter 30 Installing Snort; Chapter 31 Combining Firewalls and IDS; Index
Record Nr. UNINA-9910810207903321
Shinder Thomas W  
Rockland, Mass., : Syngress, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.]
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Burlington, Mass., : Syngress, c2007
Descrizione fisica 1 online resource (1164 p.)
Disciplina 005.8
Altri autori (Persone) ShinderThomas W
Soggetto topico Firewalls (Computer security)
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-281-10010-2
9786611100100
0-08-055687-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object
Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks
Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder
Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology
Central Configuration and the SmartDefense Web Site
Record Nr. UNINA-9910458328903321
Burlington, Mass., : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.]
Best damn firewall book period [[electronic resource] /] / T.W. Shinder ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Burlington, Mass., : Syngress, c2007
Descrizione fisica 1 online resource (1164 p.)
Disciplina 005.8
Altri autori (Persone) ShinderThomas W
Soggetto topico Firewalls (Computer security)
Computer security
ISBN 1-281-10010-2
9786611100100
0-08-055687-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object
Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks
Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder
Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology
Central Configuration and the SmartDefense Web Site
Record Nr. UNINA-9910784871803321
Burlington, Mass., : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Best damn firewall book period / / T.W. Shinder ... [et al.]
Best damn firewall book period / / T.W. Shinder ... [et al.]
Edizione [2nd ed.]
Pubbl/distr/stampa Burlington, Mass., : Syngress, c2007
Descrizione fisica 1 online resource (1164 p.)
Disciplina 005.8
Altri autori (Persone) ShinderThomas W
Soggetto topico Firewalls (Computer security)
Computer security
ISBN 1-281-10010-2
9786611100100
0-08-055687-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The Best Damn Firewall Book Period, Second Edition; Copyright Page; Contributing Authors; Contents; Chapter 1: Installing Check Point NGX; Introduction; Preparing the Gateway; Installation; Secure Platform; Fire Wall-1/VPN-1 Installation; Smart Center Server Installation; Smart Console Installation; Putting It All Together; Smart Dashboard; Summary; Chapter 2: Smart Dashboard and Smart Portal; Introduction; A Tour of the Dashboard; Logging In; The Rulebase Pane; Security Tab; Address Translation Tab; Smart Defense Tab; Web Intelligence Tab; VPN Manager Tab; QoS Tab; Desktop Security Tab
Web Access Tab Consolidation Rules Tab; The Objects Tree Pane; Network Objects; Services; Resources; Servers and OPSEC Applications; Users and Administrators; VPN Communities; The Objects List Pane; The Smart Map Pane; Menus and Toolbars; Working with Policy Packages; Installing the Policy; Global Properties; Fire Wall Page; NAT-Network Address Translation Page; VPN Page; VPN-1 Edge/Embedded Page; Remote Access Page; Smart Directory (LDAP) Page; Stateful Inspection Page; New in Smart Dashboard NGX; Security Policy Rule Names and Unique IDs; Group Object Convention; Group Hierarchy; Clone Object
Session Description Tooltips; Your First Security Policy; Creating Your Administrator Account; Hooking Up to the Gateway; Reviewing the Gateway Object; Defining Your Security Policy; Policy Design; Creating Rules; Network Address Translation; Installing the Policy; Other Useful Controls on the Dashboard; Working with Security Policy Rules; Section Titles; Hiding Rules; Rule Queries; Searching Rules; Working with Objects; Object References; Who Broke That Object?; Object Queries; Working with Policies; What Would Be Installed?; What's Really Installed?; No Security Please; For the Anoraks
Change Management Managing Connectra and Interspect Gateways; Configuring Interspect or Connectra Integration; Smart Defense Updates; SmartPortal; SmartPortal Functionality; Installing SmartPortal; Tour of SmartPortal; Summary; Chapter 3: Smart View Tracker; Introduction; Tracker; Log View; Active; Audit; Predefined Queries; Use for Predefined Queries; Adding Custom Queries; Applying Filters; Custom Queries; Matching Rule Filter; Viewing the Matching Rule; Viewing Log Records from Smart Dashboard; Active View; Live Connections; Custom Commands; Following a Source or Destination; Block Intruder
Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology
Central Configuration and the SmartDefense Web Site
Record Nr. UNINA-9910819459403321
Burlington, Mass., : Syngress, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor
The best damn firewall book period [electronic resource] / Thomas W. Shinder ... [et al.] ; Anne Carasik-Henmi, technical editor
Pubbl/distr/stampa Rockland, MA : Syngress, c2003
Descrizione fisica xxxiv, 1293 p. : ill. ; 25 cm.
Disciplina 005.8
Altri autori (Persone) Shinder, Thomas W.
Carasik, Anne H.
Soggetto topico Firewalls (Computer security)
Computer security - Computer programs
Soggetto genere / forma Electronic books.
ISBN 9781931836906
1931836906
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991003258869707536
Rockland, MA : Syngress, c2003
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
Autore Hansteen Peter N. M
Edizione [1st edition]
Pubbl/distr/stampa San Francisco, : No Starch Press, c2008
Descrizione fisica 1 online resource (188 p.)
Disciplina 005.8
Soggetto topico TCP/IP (Computer network protocol)
Firewalls (Computer security)
Soggetto genere / forma Electronic books.
ISBN 1-59327-232-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right.
Record Nr. UNINA-9910458418303321
Hansteen Peter N. M  
San Francisco, : No Starch Press, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
The book of PF [[electronic resource] ] : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
Autore Hansteen Peter N. M
Edizione [1st edition]
Pubbl/distr/stampa San Francisco, : No Starch Press, c2008
Descrizione fisica 1 online resource (188 p.)
Disciplina 005.8
Soggetto topico TCP/IP (Computer network protocol)
Firewalls (Computer security)
ISBN 1-59327-232-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right.
Record Nr. UNINA-9910784631903321
Hansteen Peter N. M  
San Francisco, : No Starch Press, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The book of PF : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
The book of PF : a no-nonsense guide to the OpenBSD firewall / / by Peter N.M. Hansteen
Autore Hansteen Peter N. M
Edizione [1st edition]
Pubbl/distr/stampa San Francisco, : No Starch Press, c2008
Descrizione fisica 1 online resource (188 p.)
Disciplina 005.8
Soggetto topico TCP/IP (Computer network protocol)
Firewalls (Computer security)
ISBN 1-59327-232-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right.
Record Nr. UNINA-9910822263803321
Hansteen Peter N. M  
San Francisco, : No Starch Press, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui