Firewalls For Dummies

Author:   Brian Komar (Komar Consulting, Inc.) ,  Ronald Beekelaar (Consultant) ,  Joern Wettern (Consultant)
Publisher:   John Wiley & Sons Inc
Edition:   2nd edition
ISBN:  

9780764540486


Pages:   432
Publication Date:   18 July 2003
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $71.25 Quantity:  
Add to Cart

Share |

Firewalls For Dummies


Add your own review!

Overview

Full Product Details

Author:   Brian Komar (Komar Consulting, Inc.) ,  Ronald Beekelaar (Consultant) ,  Joern Wettern (Consultant)
Publisher:   John Wiley & Sons Inc
Imprint:   For Dummies
Edition:   2nd edition
Dimensions:   Width: 18.80cm , Height: 2.30cm , Length: 23.90cm
Weight:   0.680kg
ISBN:  

9780764540486


ISBN 10:   0764540483
Pages:   432
Publication Date:   18 July 2003
Audience:   General/trade ,  Professional and scholarly ,  General ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Introduction. Part I: Introducing Firewall Basics. Chapter 1: Why Do You Need a Firewall? Chapter 2: IP Addressing and Other TCP/IP Basics. Chapter 3: Understanding Firewall Basics. Chapter 4: Understanding Firewall Not-So-Basics. Chapter 5: “The Key Is under the Mat” and Other Common Attacks. Part II: Establishing Rules. Chapter 6: Developing Policies. Chapter 7: Establishing Rules for Simple Protocols. Chapter 8: Designing Advanced Protocol Rules. Chapter 9: Configuring “Employees Only” and Other Specific Rules. Part III: Designing Network Configurations. Chapter 10: Setting Up Firewalls for SOHO or Personal Use. Chapter 11: Creating Demilitarized Zones with a Single Firewall. Chapter 12: Designing Demilitarized Zones with Multiple Firewalls. Part IV: Deploying Solutions Using Firewall Products. Chapter 13: Using Windows as a Firewall. Chapter 14: Configuring Linux as a Firewall. Chapter 15: Configuring Personal Firewalls: ZoneAlarm, BlackICE, and Norton Personal Firewall. Chapter 16: Microsoft’s Firewall: Internet Security and Acceleration Server. Chapter 17: The Champ: Check Point FireWall-1 Next Generation. Chapter 18: Choosing a Firewall That Meets Your Needs. Part V: The Part of Tens. Chapter 19: Ten Tools You Can’t Do Without. Chapter 20: Ten Web Sites to Visit. Appendix: Protocol Listings and More. Index.

Reviews

Author Information

Brian Komar is a native of Canada and makes his living as a Public Key Infrastructure (PKI) consultant, speaker, author, and trainer. Brian speaks at conferences around the world on network design and security topics. His consulting practice focuses on PKI design and architecture projects and on research assignments specializing in interoperability between different vendor's security products.  Ronald Beekelaar is a native of The Nethrellands, makes his living as network security consultant, author, and trainer. Ronald frequently trains network administrators on network design and enterprise security topics. He writes articles for several computer magazines, mostly about operating systems and security issues. Joern Wettern, PhD, is a native of Germany and is a network consultant and trainer. Joern has also developed a range of training materials for a large software publisher, and these materials are used to train thousands of network administrators around the world. He frequently travels to several continents to speak at computer conferences.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List