Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving students the opportunity to hone and apply the knowledge and skills they will need as working professionals. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.... processors Windows Server 2008 SP2, Standard includes Hyper VTM Red Hat Enterprise Linux 5.3 RAID 1, RAID 5 for PERC6i controllers, x8 chassis Add-in SAS6iR (SATA/SAS controller) that supports 2 HD a RAID 0 PERC6i controller, PERC battery with ... SATA Internal Optional: VMware VIEW Enterprise installation to enable server virtualization Optional: VMware VIEW Enterprise installation toanbsp;...
|Title||:||Guide to Firewalls and VPNs|
|Author||:||Michael Whitman, Herbert Mattord, Andrew Green|
|Publisher||:||Cengage Learning - 2011-06-16|