ReviewsIntroduction Chapter 1 - Introduction to Information SecurityChapter 2- An Introduction to Networking Chapter 3- Security Policies, Standards, and PlanningChapter 4 - Finding Network VulnerabilitiesChapter 5 - Firewall Planning and Design Chapter 6 - Packet FilteringChapter 7 - Working with Proxy Servers and Application-Level FirewallsChapter 8 - Firewall Configuration and Administration Chapter 9 - Encryption and FirewallsChapter 10 - Authenticating Chapter 11 - Setting Up a Virtual Private NetworkChapter 12 - Contingency Planning Chapter 13 - Intrusion Detection and Prevention SystemsChapter 14 - Digital Forensics
IllustratedYes
Dewey Decimal005.8
Table Of ContentIntroduction. Chapter 1 - Introduction to Information Security.Chapter 2- An Introduction to Networking. Chapter 3- Security Policies, Standards, and Planning.Chapter 4 - Finding Network Vulnerabilities.Chapter 5 - Firewall Planning and Design.Chapter 6 - Packet Filtering.Chapter 7 - Working with Proxy Servers and Application-Level Firewalls.Chapter 8 - Firewall Configuration and Administration.Chapter 9 - Encryption and Firewalls.Chapter 10 - Authenticating. Chapter 11 - Setting Up a Virtual Private Network.Chapter 12 - Contingency Planning. Chapter 13 - Intrusion Detection and Prevention Systems.Chapter 14 - Digital Forensics.
SynopsisFirewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response., Firewalls are among the best-known security tools in use today, and their critical role ininformation security continues to grow. However, firewalls are most effective when they arebacked by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.
LC Classification NumberTK5105.59