Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Firewalls For Dummies - ISBN 9780764540486

Firewalls For Dummies

ISBN 9780764540486

Autor: Brian Komar, Ronald Beekelaar, Joern Wettern

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 192,15 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780764540486

ISBN10:      

0764540483

Autor:      

Brian Komar, Ronald Beekelaar, Joern Wettern

Oprawa:      

Paperback

Rok Wydania:      

2003-07-18

Numer Wydania:      

2nd Edition

Ilość stron:      

432

Wymiary:      

232x197

Tematy:      

UT

Guard your DSL and protect your personal information
Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys
We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how firewalls work, control what goes in or out, and choose the right firewall product for your home or business. You’re bound to sleep better!
The Dummies WayExplanations in plain English"Get in, get out" informationIcons and other navigational aidsTear–out cheat sheetTop ten listsA dash of humor and fun

Spis treści:
Introduction.
Part I: Introducing Firewall Basics.
Chapter 1: Why Do You Need a Firewall?
Chapter 2: IP Addressing and Other TCP/IP Basics.
Chapter 3: Understanding Firewall Basics.
Chapter 4: Understanding Firewall Not–So–Basics.
Chapter 5: “The Key Is under the Mat” and Other Common Attacks.
Part II: Establishing Rules.
Chapter 6: Developing Policies.
Chapter 7: Establishing Rules for Simple Protocols.
Chapter 8: Designing Advanced Protocol Rules.
Chapter 9: Configuring “Employees Only” and Other Specific Rules.
Part III: Designing Network Configurations.
Chapter 10: Setting Up Firewalls for SOHO or Personal Use.
Chapter 11: Creating Demilitarized Zones with a Single Firewall.
Chapter 12: Designing Demilitarized Zones with Multiple Firewalls.
Part IV: Deploying Solutions Using Firewall Products.
Chapter 13: Using Windows as a Firewall.
Chapter 14: Configuring Linux as a Firewall.
Chapter 15: Configuring Personal Firewalls: ZoneAlarm, BlackICE, and Norton Personal Firewall.
Chapter 16: Microsoft’s Firewall: Internet Security and Acceleration Server.
Chapter 17: The Champ: Check Po int FireWall–1 Next Generation.
Chapter 18: Choosing a Firewall That Meets Your Needs.
Part V: The Part of Tens.
Chapter 19: Ten Tools You Can’t Do Without.
Chapter 20: Ten Web Sites to Visit.
Appendix: Protocol Listings and More.
Index.

Nota biograficzna:
Brian Komar is a native of Canada and makes his living as a Public Key Infrastructure (PKI) consultant, speaker, author, and trainer. Brian speaks at conferences around the world on network design and security topics. His consulting practice focuses on PKI design and architecture projects and on research assignments specializing in interoperability between different vendor′s security products.
 Ronald Beekelaar is a native of The Nethrellands, makes his living as network security consultant, author, and trainer. Ronald frequently trains network administrators on network design and enterprise security topics. He writes articles for several computer magazines, mostly about operating systems and security issues.
Joern Wettern, PhD, is a native of Germany and is a network consultant and trainer. Joern has also developed a range of training materials for a large software publisher, and these materials are used to train thousands of network administrators around the world. He frequently travels to several continents to speak at computer conferences.

Okładka tylna:
Guard your DSL and protect your personal information
Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys
We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how firewalls work, control what goes in or out, and choose the right firewall product for your home or business. You’re bound to sleep better!
The Dummies WayExplanations in plain English"Get in, get out" informationIcons and other navigational aidsTear–out cheat sheetTop ten listsA dash of humor and fun

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy