- Shopping Bag ( 0 items )
Hackers. Script kiddies. Disgruntled employees. A lot of people out there may want to invade your system and kick up some trouble. Firewalls can help protect you. But how do you select and set up the right firewall solution? Relax! This ...
Hackers. Script kiddies. Disgruntled employees. A lot of people out there may want to invade your system and kick up some trouble. Firewalls can help protect you. But how do you select and set up the right firewall solution? Relax! This friendly guide shows you step by step how to lock out the bad guys.ABOUT THE AUTHORS:
Brian Komar is a leading computer security consultant and speaker. Ronald Beekelaar writes about computer security and provides security training. Joern Wettern is coauthor of Inside TCP/IP.
Part I: Introducing Firewall Basics.
Chapter 1: Why Do You Need a Firewall?
Chapter 2: IP Addressing and Other TCP/IP Basics.
Chapter 3: Understanding Firewall Basics.
Chapter 4: Understanding Firewall Not-So-Basics.
Chapter 5: "The Key Is Under the Mat" and Other Common Attacks.
Part II: Establishing Rules.
Chapter 6: Developing Policies.
Chapter 7: Establishing Rules for Simple Protocols.
Chapter 8: Designing Advanced Protocol Rules.
Chapter 9: Configuring "Employees Only" and Other Specific Rules.
Part III: Designing Network Configurations.
Chapter 10: Setting Up Firewalls for SOHO or Personal Use.
Chapter 11: Creating Demilitarized Zones with a Single Firewall.
Chapter 12: Designing Demilitarized Zones with Multiple Firewalls.
Part IV: Deploying Solutions Using Firewall Products.
Chapter 13: Using Windows as a Firewall.
Chapter 14: Configuring Personal Firewalls: ZoneAlarm and BlackICE.
Chapter 15: Microsoft's Firewall: Internet Security and Acceleration Server.
Chapter 16: The Champ: Check Point FireWall-1.
Chapter 17: Choosing a Firewall That Meets Your Needs.
Part V: The Part of Tens.
Chapter 18: Ten Tools You Can't Do Without.
Chapter 19: Ten Web Sites to Visit.
Appendix: Protocol Listings and More.
Book Registration Information.