Network Security, Firewalls and VPNs
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, Second Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks. Key Features: -Introduces the basics of network security—exploring the details of firewall security and how VPNs operate -Illustrates how to plan proper network security to combat hackers and outside threats -Discusses firewall configuration and deployment and managing firewall security -Identifies how to secure local and internet communications with a VPN Instructor Materials for Network Security, Firewalls, VPNs include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
allow antivirus application attack authentication bastion host beneﬁt block certiﬁcate client communications compromise conﬁdentiality conﬁguration covert channels cryptography default deﬁned deploy deployment desktop detection device Domain encryption endpoints ensure environment exploits external extranet ﬁle ﬁltering ﬁnd ﬁrewall ﬁrst ﬂaws hacker hardware ﬁrewall hash header ICMP implementation infrastructure install interface internal network Internet intrusion IP address IPSec IPv4 IPv6 Layer Layer MAC address malware monitoring network address translation network security ofﬁce ofﬁrewall ofthe Openswan operating system options organization organization’s OSI model password perform physical port private network protect protocol proxy proxy server public key remote access risk router rule scanning security management security policy server session signiﬁcant SmoothWall software ﬁrewall speciﬁc subnet target technologies threats trafﬁc troubleshooting tunnel Tunneling Protocol users vendor virtual VPN connection vulnerability Windows wireless