Cover; Contents; Chapter 1 Network Security Policy; Chapter 2 Using Your Policies to Create Firewall and VPN Configurations; Chapter 3 Defining a Firewall; Chapter 4 Deciding on a Firewall; Chapter 5 Defining a VPN; Chapter 6 Deciding on a VPN; Chapter 7 IT Infrastructure Security Plan; Chapter 8 Case Study: SOHO (Five Computers, Printer, Servers, etc.); Chapter 9 Medium Business (<2000 People); Index.
SUMMARY OR ABSTRACT
Text of Note
This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing t.
TOPICAL NAME USED AS SUBJECT
Computer networks -- Security measures.
COMPUTERS -- Internet -- Security.
Firewalls (Computer security)
LIBRARY OF CONGRESS CLASSIFICATION
Class number
TK5105
.
59
Book number
A564
2006
PERSONAL NAME - PRIMARY RESPONSIBILITY
Anne Henmi, technical editor; Mark Lucas, Abhishek Singh, Chris Cantrell.