Narrow your search

Library

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

VIVES (2)

KU Leuven (1)

LUCA School of Arts (1)

ULB (1)

ULiège (1)

VUB (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2014 (2)

Listing 1 - 2 of 2
Sort by

Book
Untangle network security
Author:
ISBN: 1849517738 9781849517737 184951772X 9781849517720 1322242631 9781322242637 9781849517720 Year: 2014 Publisher: Birmingham

Loading...
Export citation

Choose an application

Bookmark

Abstract

If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.


Book
Automated Firewall Analytics : Design, Configuration and Optimization
Author:
ISBN: 3319103717 3319103709 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Keywords

Firewalls (Computer security) --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer networks --- Security measures --- Computer security. --- Computer Communication Networks. --- Data encryption (Computer science). --- Information systems. --- Systems and Data Security. --- Cryptology. --- Information Systems and Communication Service. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Computer communication systems. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing

Listing 1 - 2 of 2
Sort by