Knockout Narratives Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Original Essays | December 8, 2014

    Marina Warner: IMG How Is Fantasy Different from Fairy Tale?



    Fairy tale is a country of the mind where there are many inhabitants stretching back into deep time, and we're like people before Babel, we speak a... Continue »

    spacer

Guide to Firewalls and Network Security: With Intrusion Detection and VPNs (Networking)

Guide to Firewalls and Network Security: With Intrusion Detection and VPNs (Networking) Cover

 

Synopses & Reviews

Publisher Comments:

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.

Synopsis:

This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an intelligent choice of firewall technology, and presents basic firewall troubleshooting. It contains pedagogical features including chapter review questions, hands-on exercises and case projects that allow the reader to practice skills as they are learned. In addition, this text maps to the CheckPoint CCSA Certification.

Synopsis:

Provides comprehensive overview of building and maintaining firewalls in a business environment, and maps to the objectives of CheckPoint's CCSA certification.

About the Author

Michael E. Whitman, Ph.D., CISM, CISSP is a Professor of Information Systems in the Department of Computer Science and Information Systems at Kennesaw State University in Kennesaw, Georgia, where he also serves as Director of both the Master's of Science in Information Systems program and the KSU Center for Information Security Education and Awareness. Dr. Whitman is an active researcher in information security, fair and responsible use policies, and ethical computing and information systems research methods. In addition to teaching graduate and undergraduate courses in information security, local area networking, and data communications, he has written several textbooks and published in journals such as Information Systems Research, the Communications of the Association for Computing Machinery, Information and Management, the Journal of International Business Studies, and the Journal of Computer Information Systems. He is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems.Herbert Mattord, M.B.A., CISM, CISSP gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the Kennesaw State University faculty in 2002. In addition to serving as operations manager of the KSU Center for Information Security Education and Awareness, Professor Mattord teaches courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. He is also the author of numerous textbooks. During his IT career, he served an adjunct professor at Kennesaw State University, Southern Polytechnic State University, Austin Community College, and Southwest Texas State University, and he was manager of corporate information technology security at Georgia-Pacific Corporation.Richard Austin, MS, CISSP, MCSE has over 30 years of experience in the IT industry. Before pursuing a career as an independent consultant, he was focused on technology and processes for successfully protecting the 14PB storage area network infrastructure within the global IT organization of a Fortune 25 company. He teaches undergraduate information security courses as a part-time faculty at Kennesaw State University and is an active member of SNIA's Security Technical Working Group as well as a frequent writer and presenter on storage networking security and digital forensics.Greg Holden is the author of more than 35 books on Internet- and computer-related topics, including the Web design applications Microsoft FrontPage and Macromedia Dreamweaver. He also does Web development for the design firm NewCor Group. He helped design recruitment literature and course catalogs for the University of Chicago. He lives in Chicago with his two teenage daughters and assorted birds, fish, and other pets.

Table of Contents

1. Firewall Planning and Design 2. Developing a Security Policy 3. Firewall Configuration Strategies 4. Packet Filtering 5. Working with Proxy Servers and Application-Level Firewalls 6. Authenticating Users 7. Encryption and Firewalls 8. Choosing a Bastion Host 9. Setting Up a Virtual Private Network 10. Building Your Own Firewall 11. Ongoing Administration Appendix A: Security Resources

Product Details

ISBN:
9780619130398
Publisher:
Cengage Learning
Subject:
Networking - General
Author:
Austin, Richard
Author:
Mattord, Herbert J.
Author:
Holden, Greg
Author:
Holden, Greg (Greg Holden)
Author:
Whitman, Michael E.
Subject:
Security
Subject:
Guide to Firewalls and Network Security: Intrusion; Detection and VPNs
Subject:
Guide to Firewalls and Network Security: Intrusion
Subject:
Detection and VPNs
Copyright:
Series:
Networking
Publication Date:
July 2003
Binding:
Paperback
Grade Level:
College/higher education:
Language:
English
Illustrations:
Y
Pages:
456
Dimensions:
9.32x7.46x.94 in. 1.74 lbs.

Related Subjects

Computers and Internet » Internet » General

Guide to Firewalls and Network Security: With Intrusion Detection and VPNs (Networking)
0 stars - 0 reviews
$ In Stock
Product details 456 pages Course Technology - English 9780619130398 Reviews:
"Synopsis" by , This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an intelligent choice of firewall technology, and presents basic firewall troubleshooting. It contains pedagogical features including chapter review questions, hands-on exercises and case projects that allow the reader to practice skills as they are learned. In addition, this text maps to the CheckPoint CCSA Certification.
"Synopsis" by , Provides comprehensive overview of building and maintaining firewalls in a business environment, and maps to the objectives of CheckPoint's CCSA certification.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.