Listing 1 - 10 of 28 | << page >> |
Sort by
|
Choose an application
Welke veiligheidsrisico's loopt uw bedrijf? Stel een plan op om uw informatie veilig te stellen! Men beweert dat dankzij de explosieve groei van intranet en het Internet de productiviteit en opbrengsten van elk bedrijf zullen verbeteren. Maar deze voorspelling heeft een keerzijde: de levensechte dreiging van aanvallen op uw netwerk en het verlies van data. De beveiligingsdeskundigen Edward Amoroso en Ronald Sharp helpen u met Internet en intranet firewall-strategieën bij het maken van een strategisch plan om uw gegevens veilig te stellen. Dit boek behandelt: hoe u de specifieke bedreigingen van uw bedrijfsintranet in kaart brengt, belangrijke kenmerken van firewalls: de betekenis en werking ervan, en welke voor u geschikt is, hoe u een plan opstelt voor een praktische en inzichtelijke firewall-strategie. De auteurs hebben jarenlange ervaring op het gebied van het beveiligen van computersystemen. Ze ontraadselen de geheimen van gegevensbescherming en verschaffen antwoorden aan managers en systeembeheerders die hun informatie veilig willen stellen met behulp van firewalls. (flaptekst)
Internet : firewalls --- 681.324 --- internet --- intranet --- firewall --- Computer architecture. Operating systems --- firewalls --- computerbeveiliging --- netwerkbeheer
Choose an application
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity of security management and ensure that their security systems can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress' best-selling references on Check Point's market leading Firewall and VPN products.
Firewalls (Computer security) --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer networks --- Security measures --- Information Technology --- General and Others
Choose an application
Computer networks --- Firewalls (Computer security) --- Security measures. --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures
Choose an application
Configuring NetScreen Firewalls covers all of the aspects of Juniper's NetScreen product line, from devices to Enterprise NetScreen firewalls. Coverage includes basic policy creation and administration, advanced troubleshooting techniques, the NetScreen Security Manager and VPN configuration. In addition, this book covers both the WebUI and the command line interface of NetScreen ScreenOS 5.0. as well as the NetScreen Security Manager (NSM). As a special bonus, Juniper Networks provides detailed coverage of the new features and enhancements included with ScreenOS 5.1.0.
Firewalls (Computer security) --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer security --- Security measures
Choose an application
Firewalls (Computer security) --- firewall --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer networks --- Security measures --- Computer architecture. Operating systems --- firewalls --- computerbeveiliging --- netwerkbeheer
Choose an application
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies. This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as
Firewalls (Computer security) --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer networks --- Security measures --- Coupe-feu (Sécurité informatique) --- Réseaux d'ordinateurs --- Sécurité --- Mesures
Choose an application
This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ,
Firewalls (Computer security) --- Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Security measures. --- Security measures
Choose an application
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange
Firewalls (Computer security) --- Internet --- Systems migration. --- Security measures. --- Microsoft ISA server. --- Information systems migration --- Migration, Systems --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- ISA server --- Systems engineering --- Computer networks --- Security measures --- Information Technology --- General and Others
Choose an application
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.Configuring Juniper Networks NetScreen & SSG Firewalls is the only complete reference to this family of products. It covers all of the newly released features of the product line as highlighted by Juniper Networks, including: Deep Inspection firewall extends s
Firewalls (Computer security) --- Computer networks --- Security measures. --- Juniper Networks, Inc. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer security --- Security measures --- Information Technology --- General and Others
Choose an application
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Computer networks --- Firewalls (Computer security) --- Security measures. --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures --- Information Technology --- General and Others
Listing 1 - 10 of 28 | << page >> |
Sort by
|