Network Security, Firewalls, and VPNsJones & Bartlett Publishers, 15 sep 2010 - 482 pagina's PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Network Security, Firewalls, and VPNs provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks. |
Inhoudsopgave
PART ONE Foundations of Network Security | 1 |
PART TWO Technical Overview of Network Security Firewalls and VPNs | 149 |
PART THREE Implementation Resources and the Future | 369 |
APPENDIX A Answer Key | 437 |
APPENIDX B Standard Acronyms | 439 |
Glossary of Key Terms | 441 |
467 | |
471 | |
Overige edities - Alles bekijken
Veelvoorkomende woorden en zinsdelen
access control allow application attacks authentication bastion host block Chapter client communications compromise configuration covert channels cryptography default deploy deployment desktop detection device domain egress filtering encryption endpoints ensure environment exploits external extranet firewall rules H PL H hacker hardware firewall hash header host firewall ICMP infrastructure install internal network Internet intrusion IP address IPSec IPv4 IPv6 MAC address malware monitoring network address translation network security open-source Openswan operating system options organization organization’s OSI model packet filtering password payload perform physical PL H PL port potential private network protect protocol proxy proxy server public key remote access risk router scanning security policy server session SmoothWall solution specific spoofing subnet switch target technologies threats topology traffic troubleshooting tunnel Tunneling Protocol unauthorized users vendor virtual VPN connection vulnerability Windows wireless