Firewall Fundamentals (Paperback)
11:54 PM
# Paperback: 408 pages
# Publisher: Cisco Press; 1st edition (June 12, 2006)
# Language: English
# ISBN-10: 1587052210
# ISBN-13: 978-1587052217
Price: $34.75
The essential guide to understanding and using firewalls to protect personal computers and your network
* An easy-to-read introduction to the most commonly deployed network security device
* Understand the threats firewalls are designed to protect against
* Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks
* Includes configuration, deployment, and management checklists
Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices. Firewall Fundamentals is written in clear and easy-to-understand language and helps novice users understand what firewalls are and how and where they are used. It introduces various types of firewalls, first conceptually and then by explaining how different firewall implementations actually work. It also provides numerous implementation examples, demonstrating the use of firewalls in both personal and business-related scenarios, and explains how a firewall should be installed and configured. Additionally, generic firewall troubleshooting methodologies and common management tasks are clearly defined and explained.
About the Author
Wesley J Noonan (Houston, Texas) has been working in the computer industry for over 12 years, specializing in Windows-based networks and network infrastructure security design and implementation. He is a Staff Quality Engineer for NetIQ working on their security solutions product line.
Ido Dubrawsky (Sliver Springs, MD) is a Senior Security Consultant with Callisma, an SBC subsidiary. He advises customers on a wide variety of security issues. Previously he was a Network Security Architect with Cisco Systems SAFE Architecture Team
Link download :
http://uploading.com/files/35ZUDXHE/FFund.rar.html
Post a Comment