Item Details

Print View

Personal Firewalls for Administrators and Remote Users [electronic resource]

Yeo, Lisa
Format
EBook; Book; Online
Published
E Rutherford : Prentice Hall PTR Dec. 2002 Old Tappan : Pearson Education [Distributor]
Language
English
ISBN
9780130462220, 0130462225 (Trade Paper)
Target Audience
Scholarly & Professional
Summary
Annotation
Description
Mode of access: World wide Web.
Copyright Not EvaluatedCopyright Not Evaluated
Technical Details
  • Access in Virgo Classic
  • Staff View

    LEADER 02886nam a22003972 4500
    001 u5832814
    003 SIRSI
    005 20121108060455.0
    006 m d
    007 cr n
    008 020715e20021219njua s|||||||| 2|eng|d
    010
      
      
    a| 2002042492
    020
      
      
    a| 9780130462220
    020
      
      
    a| 0130462225 (Trade Paper) c| USD 34.99 Retail Price (Pearson Education) 9| Out of Stock Indefinitely
    024
    1
      
    a| 076092018889
    024
    3
      
    a| 9780130462220
    035
      
      
    a| (WaSeSS)ssj0000077111
    037
      
      
    b| 00021483
    040
      
      
    a| BIP US d| WaSeSS
    050
      
    0
    a| TK5105.59.Y46 2002
    082
    0
    0
    a| 005.8 2| 21
    100
    1
      
    a| Yeo, Lisa d| 1970- e| Author
    245
    1
    0
    a| Personal Firewalls for Administrators and Remote Users h| [electronic resource]
    260
      
      
    a| E Rutherford : b| Prentice Hall PTR c| Dec. 2002 a| Old Tappan : b| Pearson Education [Distributor]
    520
    8
      
    a| Annotation b| -- Will cover products such as Black Ice Defender, Zone Alarm and iptables(linux)among others.-- Special section on selecting personal firewalls for remote and mobile corporate users as well as for the home systems of corporate users.-- Explains what protection level and method is best for different circumstances.While corporate system administrators spend lots of time thinking about enterprise firewall systems for their in-house employees, a vulnerability that is often overlooked is the remote employee's unprotected computer system, the unprotected computers of mobile laptop users (employees on the road) and all those unprotected but networked handheld devices. At the same time, many home computer users who have always relied on high speed Internet access don't realize that without a personal firewall, they too are quite vulnerable to intrusion and attacks. This book is designed to explain how personal firewalls work and how to determine which type of firewall works best in a given situation. Yeo starts with an intro to security basics -basic data protection measures (passwords, virus software, encryption, and firewalls) and reviews common vulnerabilities and issues with the always-on Internet. Yeo then explains protection methods used by firewalls in general - proxy server firewalls, packet filters, signature-based firewalls and stateful inspection-based firewalls while examining strengths and weaknesses of each type. She then explains how each type
    521
      
      
    a| Scholarly & Professional b| Prentice Hall PTR
    538
      
      
    a| Mode of access: World wide Web.
    655
      
    0
    a| Electronic books.
    690
      
      
    a| Computer Security
    692
      
      
    a| Computers x| Security x| General
    710
    2
      
    a| Safari Books Online
    856
    4
    0
    u| http://RE5QY4SB7X.search.serialssolutions.com/?V=1.0&L=RE5QY4SB7X&S=JCs&C=TC0000077111&T=marc
    952
      
      
    a| 0130462225
    596
      
      
    a| 1
    999
      
      
    a| XX(5832814.1) w| WEB i| 5832814-1001 l| INTERNET m| UVA-LIB t| INTERNET
▾See more
▴See less

Availability

Google Preview

Google Books Preview

Read Online