Guide to Firewalls and Network Security : With Intrusion Detection and VPNs by Greg Holden, Richard Austin, Michael E. Whitman and Herbert J. Mattord (2008, Trade Paperback)

AlibrisBooks (462816)
98.6% positive feedback
Price:
$209.89
Free shipping
Estimated delivery Mon, Aug 18 - Fri, Aug 22
Returns:
30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Brand New
New Trade paperback

About this product

Product Identifiers

PublisherCourse Technology
ISBN-101435420160
ISBN-139781435420168
eBay Product ID (ePID)64403760

Product Key Features

Number of Pages520 Pages
LanguageEnglish
Publication NameGuide to Firewalls and Network Security : with Intrusion Detection and Vpns
SubjectNetworking / Intranets & Extranets, Security / General, General, Security / Networking
Publication Year2008
TypeTextbook
AuthorGreg Holden, Richard Austin, Michael E. Whitman, Herbert J. Mattord
Subject AreaComputers
FormatTrade Paperback

Dimensions

Item Height0.9 in
Item Weight27.3 Oz
Item Length9 in
Item Width7.5 in

Additional Product Features

Edition Number2
Intended AudienceCollege Audience
LCCN2008-300737
Dewey Edition22
ReviewsIntroduction Chapter 1 - Introduction to Information SecurityChapter 2- An Introduction to Networking Chapter 3- Security Policies, Standards, and PlanningChapter 4 - Finding Network VulnerabilitiesChapter 5 - Firewall Planning and Design Chapter 6 - Packet FilteringChapter 7 - Working with Proxy Servers and Application-Level FirewallsChapter 8 - Firewall Configuration and Administration Chapter 9 - Encryption and FirewallsChapter 10 - Authenticating Chapter 11 - Setting Up a Virtual Private NetworkChapter 12 - Contingency Planning Chapter 13 - Intrusion Detection and Prevention SystemsChapter 14 - Digital Forensics
IllustratedYes
Dewey Decimal005.8
Table Of ContentIntroduction. Chapter 1 - Introduction to Information Security.Chapter 2- An Introduction to Networking. Chapter 3- Security Policies, Standards, and Planning.Chapter 4 - Finding Network Vulnerabilities.Chapter 5 - Firewall Planning and Design.Chapter 6 - Packet Filtering.Chapter 7 - Working with Proxy Servers and Application-Level Firewalls.Chapter 8 - Firewall Configuration and Administration.Chapter 9 - Encryption and Firewalls.Chapter 10 - Authenticating. Chapter 11 - Setting Up a Virtual Private Network.Chapter 12 - Contingency Planning. Chapter 13 - Intrusion Detection and Prevention Systems.Chapter 14 - Digital Forensics.
SynopsisFirewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response., Firewalls are among the best-known security tools in use today, and their critical role ininformation security continues to grow. However, firewalls are most effective when they arebacked by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.
LC Classification NumberTK5105.59

All listings for this product

Buy It Now
Any Condition
New
Pre-owned
No ratings or reviews yet
Be the first to write a review