Amazon cover image
Image from Amazon.com

Guide to firewalls and network security: with intrusion detection and VPNs.

By: Contributor(s): Material type: TextPublication details: Boston, Massachusetts : Cengage Delmar Learning ; c2009.Edition: 2nd edDescription: xxiv, 496 p. : ill. ; 24 cmISBN:
  • 9781435420168 (pbk.)
  • 1435420160 (pbk.)
Subject(s): LOC classification:
  • TK5105.59 .W58
Contents:
Chapter 1 - Introduction to Information Security. Chapter 2- An Introduction to Networking. Chapter 3- Security Policies, Standards, and Planning. Chapter 4 - Finding Network Vulnerabilities. Chapter 5 - Firewall Planning and Design. Chapter 6 - Packet Filtering. Chapter 7 - Working with Proxy Servers and Application-Level Firewalls. Chapter 8 - Firewall Configuration and Administration. Chapter 9 - Encryption and Firewalls. Chapter 10 - Authenticating. Chapter 11 - Setting Up a Virtual Private Network. Chapter 12 - Contingency Planning. Chapter 13 - Intrusion Detection and Prevention Systems. Chapter 14 - Digital Forensics.
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books Methodist University Library Main General Stacks TK5105.59 .W58 (Browse shelf(Opens below)) Available 39993
Books Methodist University Library Main General Stacks TK5105.59 .W58 (Browse shelf(Opens below)) Available 39992
Books Methodist University Library Main General Stacks TK5105.59 .W58 (Browse shelf(Opens below)) Available 4518
Books Methodist University Library Main General Stacks Reference TK5105.59 .W58 (Browse shelf(Opens below)) Available 39990
Books Methodist University Library Main General Stacks Reference TK5105.59 .W58 (Browse shelf(Opens below)) Available 39991

Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004.

Includes index.

Chapter 1 - Introduction to Information Security.
Chapter 2- An Introduction to Networking.
Chapter 3- Security Policies, Standards, and Planning.
Chapter 4 - Finding Network Vulnerabilities.
Chapter 5 - Firewall Planning and Design.
Chapter 6 - Packet Filtering.
Chapter 7 - Working with Proxy Servers and Application-Level Firewalls.
Chapter 8 - Firewall Configuration and Administration.
Chapter 9 - Encryption and Firewalls.
Chapter 10 - Authenticating.
Chapter 11 - Setting Up a Virtual Private Network.
Chapter 12 - Contingency Planning.
Chapter 13 - Intrusion Detection and Prevention Systems. Chapter 14 - Digital Forensics.

There are no comments on this title.

to post a comment.
Share
Copyright © 2026  MUG Library