Inside network perimeter security : the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
Main Library Reference | Reference | 005.8 INS (Browse shelf(Opens below)) | Available | 009498 |
Browsing Main Library shelves, Shelving location: Reference, Collection: Reference Close shelf browser (Hides shelf browser)
Included Index.
Perimeter security fundamentals --
Packet filtering --
Stateful firewalls --
Proxy firewalls --
Security policy --
Role of a router --
Network intrusion detection --
Virtual private networks --
Host hardening --
Host defense components --
Design fundamentals --
Separating resources --
Software architecture --
VPN integration --
Tuning the design for performance --
Sample designs --
Maintaining a security perimeter --
Network log file analysis --
Troubleshooting defense components --
Assessment techniques --
Design under fire --
Importance of defense in depth.
There are no comments on this title.