Guide to Firewalls and Network Security / Edition 2

Guide to Firewalls and Network Security / Edition 2

by Michael E. Whitman, Richard Austin, Greg Holden, Herbert J. Mattord
     
 

View All Available Formats & Editions

ISBN-10: 1435420160

ISBN-13: 9781435420168

Pub. Date: 06/10/2008

Publisher: Cengage Learning

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book

Overview

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.

Product Details

ISBN-13:
9781435420168
Publisher:
Cengage Learning
Publication date:
06/10/2008
Edition description:
Older Edition
Pages:
520
Product dimensions:
7.40(w) x 9.10(h) x 0.60(d)

Related Subjects

Table of Contents

Introduction. Chapter 1 - Introduction to Information Security. Chapter 2- An Introduction to Networking. Chapter 3- Security Policies, Standards, and Planning. Chapter 4 - Finding Network Vulnerabilities. Chapter 5 - Firewall Planning and Design. Chapter 6 - Packet Filtering. Chapter 7 - Working with Proxy Servers and Application-Level Firewalls. Chapter 8 - Firewall Configuration and Administration. Chapter 9 - Encryption and Firewalls. Chapter 10 - Authenticating. Chapter 11 - Setting Up a Virtual Private Network. Chapter 12 - Contingency Planning. Chapter 13 - Intrusion Detection and Prevention Systems. Chapter 14 - Digital Forensics.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >