Firewalls and network security / Michael E. Whitman, Herbert J. Mattord, Andrew Green.

By: Whitman, Michael EContributor(s): Green, Andrew | Mattord, Herbert JPublisher: New Delhi, India Cengage Learning, c2008Description: 388 p. : ill. ; 23 cmISBN: 978-315-1029-2Subject(s): Computer networks -- Security measures | Computer networks -- Security measures | Computer security | Extranets (Computer networks) | Firewalls (Computer security) | Firewalls (Computer security)DDC classification: 005.8,WHI
Contents:
Introduction to information Security (Page-11), An Introduction to Networking (Page-40), Security Policies, Standards and Planning (Page-69), Finding Network Vulnerablities (Page-101), Firwall Planing and design (Page-124), Packet Filtering (Page-156), Working with proxy servers and Application level Firewalls (Page-175), Firewall Configuration and Administration (Page-193), Encryption and Firewalls (Page-215), Authenticating users (Page-238), Setting Up a virtual Private Network (Page-253), Cintingency planning (Page-276), Intrusion Detection and Prevention Systems (Page-314), Digital Forensics (Page-349).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,WHI (Browse shelf) Link to resource Available Almirah No.9, Shelf No.4 MCS37125
Total holds: 0
Browsing Military College of Signals (MCS) shelves, Shelving location: General Stacks Close shelf browser

Introduction to information Security (Page-11), An Introduction to Networking (Page-40), Security Policies, Standards and Planning (Page-69), Finding Network Vulnerablities (Page-101), Firwall Planing and design (Page-124), Packet Filtering (Page-156), Working with proxy servers and Application level Firewalls (Page-175), Firewall Configuration and Administration (Page-193), Encryption and Firewalls (Page-215), Authenticating users (Page-238), Setting Up a virtual Private Network (Page-253), Cintingency planning (Page-276), Intrusion Detection and Prevention Systems (Page-314), Digital Forensics (Page-349).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.