|
本帖最后由 石头 于 2009-12-31 15:00 编辑
作者:Wes Noonan, Ido Dubrawsky
出版日期:June 12, 2006
出版社:Cisco Press
页数:408
ISBN:ISBN-10: 1587052210 ISBN-13: 978-1587052217
文件格式:CHM
Product DescriptionThe essential guide to understanding and using firewalls to protect personal computers and your network
- An easy-to-read introduction to the most commonly deployed network security device
- Understand the threats firewalls are designed to protect against
- Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks
- Includes configuration, deployment, and management checklists
Increasing reliance on the Internet in bothwork and home environments has radically increased the vulnerability ofcomputing systems to attack from a wide variety of threats. Firewalltechnology continues to be the most prevalent form of protectionagainst existing and new threats to computers and networks. A fullunderstanding of what firewalls can do, how they can be deployed tomaximum effect, and the differences among firewall types can make thedifference between continued network integrity and complete network orcomputer failure. Firewall Fundamentals introduces readers tofirewall concepts and explores various commercial and open sourcefirewall implementations–including Cisco, Linksys, and Linux–allowingnetwork administrators and small office/home office computer users toeffectively choose and configure their devices. Firewall Fundamentalsis written in clear and easy-to-understand language and helps noviceusers understand what firewalls are and how and where they are used. Itintroduces various types of firewalls, first conceptually and then byexplaining how different firewall implementations actually work. Italso provides numerous implementation examples, demonstrating the useof firewalls in both personal and business-related scenarios, andexplains how a firewall should be installed and configured.Additionally, generic firewall troubleshooting methodologies and commonmanagement tasks are clearly defined and explained.
About the Author
Wesley J Noonan (Houston,Texas) has been working in the computer industry for over 12 years,specializing in Windows-based networks and network infrastructuresecurity design and implementation. He is a Staff Quality Engineer forNetIQ working on their security solutions product line.
Ido Dubrawsky (SliverSprings, MD) is a Senior Security Consultant with Callisma, an SBCsubsidiary. He advises customers on a wide variety of security issues.Previously he was a Network Security Architect with Cisco Systems SAFEArchitecture Team |
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册
×
|