Firewalls 24seven, 2/e
Matthew Strebe, Charles Perkins
- 出版商: Sybex
- 出版日期: 2002-03-01
- 售價: $1,900
- 貴賓價: 9.5 折 $1,805
- 語言: 英文
- 頁數: 544
- 裝訂: Paperback
- ISBN: 0782140548
- ISBN-13: 9780782140545
已絕版
買這商品的人也買了...
-
$1,205TCP/IP Illustrated, Volume 1: The Protocols (Hardcover)
-
$1,200$1,176 -
$2,620$2,489 -
$1,107Distributed Systems: Concepts and Design, 3/e
-
$960An Introduction to Formal Languages and Automata, 3/e
-
$1,029Operating System Concepts, 6/e
-
$970Introduction to Algorithms, 2/e
-
$1,150$1,127 -
$950Artificial Intelligence: A Guide to Intelligent Systems
-
$600$510 -
$1,039Modern VLSI Design: System-on-Chip Design, 3/e (精裝)
-
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,030$1,009 -
$780$741 -
$1,127Computer Networks, 4/e
-
$650$553 -
$620$527 -
$680$537 -
$600$474 -
$290$261 -
$580$458 -
$640$576 -
$400$316 -
$480$379
相關主題
商品描述
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.
Written to build on the knowledge you already have. Inside, two
network security experts deliver the targeted instruction and inside tips you
need to maintain and improve your network's security. Coverage includes:
- Hackers and their motivations
- Encryption and VPN theory and techniques
- TCP/IP and packet filtering
- Proxy services
- Network Address Translation
- Firewall configuration
- Detecting network intrusions
- Tuning Linux to act as a firewall
- Tuning Windows NT or 2000 to act as a firewall
- Features and benefits of Windows-based firewalls
- Features and benefits of UNIX-based firewalls
- Features and benefits of device-based firewalls
Contents
Introduction
Part 1 The Internet
Chapter 1 Understanding
Firewalls
Chapter 2 Hackers
Chapter 3 TCP/IP from a Security
Viewpoint
Chapter 4 Sockets and Services from a Security Point of
View
Chapter 5 Encryption
Part 2 Firewall Technology
Chapter 6
Packet Filtering
Chapter 7 Network Address Translation
Chapter 8
Application-Level Proxies
Chapter 9 Virtual Private Networks
Chapter 10
The Ideal Firewall
Chapter 11 Configuring a Real Firewall
Part 3
Additional Security Tools
Chapter 12 Attack Profiles
Chapter 13 Security
Utilities
Chapter 14 Intrusion Detection
Part 4 Operating Systems as
Firewalls
Chapter 15 Windows as a Firewall
Chapter 16 Open Source
Firewalls
Part 5 Commercial Firewalls
Chapter 17 Windows
Firewalls
Chapter 18 Unix Firewalls
Chapter 19 Device and Specialty
Firewalls
Index