Guide to firewalls and network security: with intrusion detection and VPNs.
Material type:
TextPublication details: Boston, Massachusetts : Cengage Delmar Learning ; c2009.Edition: 2nd edDescription: xxiv, 496 p. : ill. ; 24 cmISBN: - 9781435420168 (pbk.)
- 1435420160 (pbk.)
- TK5105.59 .W58
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Books
|
Methodist University Library Main General Stacks | TK5105.59 .W58 (Browse shelf(Opens below)) | Available | 39993 | ||||||||||||||
Books
|
Methodist University Library Main General Stacks | TK5105.59 .W58 (Browse shelf(Opens below)) | Available | 39992 | ||||||||||||||
Books
|
Methodist University Library Main General Stacks | TK5105.59 .W58 (Browse shelf(Opens below)) | Available | 4518 | ||||||||||||||
Books
|
Methodist University Library Main General Stacks | Reference | TK5105.59 .W58 (Browse shelf(Opens below)) | Available | 39990 | |||||||||||||
Books
|
Methodist University Library Main General Stacks | Reference | TK5105.59 .W58 (Browse shelf(Opens below)) | Available | 39991 |
Browsing Methodist University Library Main shelves,Shelving location: General Stacks,Collection: Reference Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| TK5105.59 .P36 Novell's BorderManager administrator's handbook / | TK5105.59 .S713 Cryptography and network security : | TK5105.59 .Sh1 Hacking Web services | TK5105.59 .W58 Guide to firewalls and network security: | TK5105.59 .W58 Guide to firewalls and network security: | TK5105.7 .C492 Cisco IOS switching services / | TK5105.7 .C677 Novell's ManageWise administrator's handbook / |
Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004.
Includes index.
Chapter 1 - Introduction to Information Security.
Chapter 2- An Introduction to Networking.
Chapter 3- Security Policies, Standards, and Planning.
Chapter 4 - Finding Network Vulnerabilities.
Chapter 5 - Firewall Planning and Design.
Chapter 6 - Packet Filtering.
Chapter 7 - Working with Proxy Servers and Application-Level Firewalls.
Chapter 8 - Firewall Configuration and Administration.
Chapter 9 - Encryption and Firewalls.
Chapter 10 - Authenticating.
Chapter 11 - Setting Up a Virtual Private Network.
Chapter 12 - Contingency Planning.
Chapter 13 - Intrusion Detection and Prevention Systems. Chapter 14 - Digital Forensics.
There are no comments on this title.