000 01392cam a22002177a 4500
999 _c7052
_d7052
020 _a9781435420168 (pbk.)
020 _a1435420160 (pbk.)
050 0 0 _aTK5105.59
_b.W58
100 1 _aWhitman, Michael E.,
245 1 0 _aGuide to firewalls and network security:
_bwith intrusion detection and VPNs.
250 _a2nd ed.
260 _aBoston, Massachusetts :
_bCengage Delmar Learning ;
_cc2009.
300 _axxiv, 496 p. :
_bill. ;
_c24 cm.
500 _aPrevious ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004.
500 _aIncludes index.
505 _aChapter 1 - Introduction to Information Security. Chapter 2- An Introduction to Networking. Chapter 3- Security Policies, Standards, and Planning. Chapter 4 - Finding Network Vulnerabilities. Chapter 5 - Firewall Planning and Design. Chapter 6 - Packet Filtering. Chapter 7 - Working with Proxy Servers and Application-Level Firewalls. Chapter 8 - Firewall Configuration and Administration. Chapter 9 - Encryption and Firewalls. Chapter 10 - Authenticating. Chapter 11 - Setting Up a Virtual Private Network. Chapter 12 - Contingency Planning. Chapter 13 - Intrusion Detection and Prevention Systems. Chapter 14 - Digital Forensics.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures
700 1 _aHolden, Greg.
942 _cBK