Network Security, Firewalls, and VPNsNetwork Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
PART 2 Securing the Perimeter with Firewalls | 131 |
PART 3 Establishing Remote Access with VPNs | 251 |
PART 4 Implementing Network Security | 351 |
APPENDIX A Answer Key | 427 |
APPENDIX B Standard Acronyms | 429 |
Glossary of Key Terms | 435 |
463 | |
469 | |
Other editions - View all
Common terms and phrases
activities additional administrators allow application attack attempt authentication authorized block cause chapter client communication complex compromise configuration connection consider create default defense defined deployed deployment detection device employees encryption ensure environment example exist exploits external FIGURE filtering firewall function hacker hardware host implementation important infrastructure installation interface internal Internet IP address issues known Layer limitations logical malicious monitoring network security occurs Once operating options organization packet password perform physical port possible potential prevent protect protocol proxy remote requires response result risk router rules server session single solution specific switch technologies threats tion traffic trust tunnel understand virtual vulnerabilities wireless