Paperback 3rd Edition text. CLEAN INSIDE!!! Book is in good condition. Contains little to no writing/highlighting. If sold after noon on Saturday book will not ship until Monday. ...If sold after noon on Saturday book will not ship until Monday.. Ships fast. Ships fast. Expedited shipping 2-4 business days; Standard shipping 7-14 business days. Ships from USA!Read moreShow Less
2011 Paperback Good Connecting readers with great books since 1972. Used books may not include companion materials, some shelf wear, may contain highlighting/notes, and may not ...include cd-rom or access codes. Customer service is our top priority!Read moreShow Less
Ships same day or next business day via UPS (Priority Mail for AK/HI/APO/PO Boxes)! Used sticker and some writing and/or highlighting. Used books may not include working access ...code or dust jacket.Read moreShow Less
2011 Paperback Good Books have varying amounts of wear and highlighting. Usually ships within 24 hours in quality packaging. Satisfaction guaranteed. This item may not include ...any CDs, Infotracs, Access cards or other supplementary material.Read moreShow Less
PAPERBACK Good 1111135398 Good condition books may have signs of cover wear and/or marks on corners and page edges. Inside pages may have highlighting, writing and underlining. ...Supplemental materials such as CDs, Access Codes, and Course Packs are not guaranteed to be included. Ships fast from Ontario, delivery is between 5-10 business days. Satisfaction guaranteed!Read moreShow Less
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving you the opportunity to hone and apply the knowledge and skills you will need as a working professional. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals nationwide.
Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology.
Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.
Andrew Green has been involved in information security for nine years, offering consulting services that focus primarily on the needs of small and medium-sized businesses. Prior to becoming a full-time information security consultant, Mr. Green worked in the health care IT field, where he developed and supported transcription interfaces for medical facilities throughout the United States. In addition to his consulting work, Mr. Green is faculty member at Kennesaw State University, where he teaches classes in information security, database management, and Web development.
Introduction. Part I: INTRODUCTION TO INFORMATION SECURITY. 1. Introduction to Information Security. 2. Network Security Policies and Standards. 3. Authenticating Users. Case Projects. Part II: FIREWALLS. 4. Introduction to Firewalls. 5. Packet Filtering. 6. Firewall Configuration and Administration. 7. Working with Proxy Servers and Application-Level Firewalls. 8. Selecting and Implementing the Firewall. Part III: VPNs. 9. Encryption and Firewalls. 10. Setting Up a Virtual Private Network.