Guide to Firewalls & VPN's, 3rd Edition

Guide to Firewalls & VPN's, 3rd Edition

English | June 16th, 2011 | ISBN: 1111135398 | 36 Pages | True PDF | 2.62 MB

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools.

GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving you the opportunity to hone and apply the knowledge and skills you will need as a working professional. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals nationwide.


[Fast Download] Guide to Firewalls & VPN's, 3rd Edition

Ebooks related to "Guide to Firewalls & VPN's, 3rd Edition" :
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites
Role-Based Access Control, Second Edition
Digital Forensics and Cyber Crime
Mastering pfSense
Community Policing - A European Perspective: Strategies, Best Practices and Guidelines
Crime Victim's Guide to Justice, 2e by Mary L. Boland
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference
Coding Freedom: The Ethics and Aesthetics of Hacking
Architecting Critical Systems
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.