Thursday, August 29, 2019

Firewalls For Dummies, 2nd Edition

File Size: 8.01 Mb

We try to provide you with a book that can act as a reference guide for firewalls. We don’t expect you to read the book from cover to cover but to look at specific topics that meet your needs. Twenty chapters and an appendix cover all topics of firewalls and their implementation. Just turn to the chapter that catches your attention and start reading. Each chapter has been designed so that you can read it on its own.

Part I: Introducing Firewall Basics
Chapter 1: Why Do You Need a Firewall?
Chapter 2: IP Addressing and Other TCP/IP Basics
Chapter 3: Understanding Firewall Basics
Chapter 4: Understanding Firewall Not-So-Basics
Chapter 5: “The Key Is under the Mat” and Other Common Attacks
Part II: Establishing Rules
Chapter 6: Developing Policies
Chapter 7: Establishing Rules for Simple Protocols
Chapter 8: Designing Advanced Protocol Rules
Chapter 9: Configuring “Employees Only” and Other Specific Rules
Part III: Designing Network Configurations
Chapter 10: Setting Up Firewalls for SOHO or Personal Use
Chapter 11: Creating Demilitarized Zones with a Single Firewall
Chapter 12: Designing Demilitarized Zones with Multiple Firewalls
Part IV: Deploying Solutions Using Firewall Products
Chapter 13: Using Windows as a Firewall
Chapter 14: Configuring Linux as a Firewall
Chapter 15: Configuring Personal Firewalls: ZoneAlarm, BlackICE, and Norton Personal Firewall
Chapter 16: Microsoft’s Firewall: Internet Security and Acceleration Server
Chapter 17: The Champ: Check Point FireWall-1 Next Generation
Chapter 18: Choosing a Firewall That Meets Your Needs
Part V: The Part of Tens
Chapter 19: Ten Tools You Can’t Do Without
Chapter 20: Ten Web Sites to Visit
Appendix: Protocol Listings and More

Author Details
"Brian Komar", B. Comm (Hons), a native of Canada, makes his living as a Public Key Infrastructure (PKI) consultant, speaker, author, and trainer. Brian speaks at conferences around the world on network design and security topics.

"Ronald Beekelaar", M.Sc., a native of The Netherlands, makes his living as a network security consultant, author, and trainer. Ronald frequently trains network administrators on network design and enterprise security topics.

"Joern Wettern", Ph.D., a native of Germany, is a network consultant and trainer. Joern has also developed a range of training materials for a large software publisher, and these materials are used to train thousands of network administrators around the world.

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment