Solution Manual for Guide to Firewalls and VPNs 3rd Edition

Original price was: $59.00.Current price is: $29.99.

Solution Manual for Guide to Firewalls and VPNs 3rd Edition Digital Instant Download

Category:

Solution Manual for Guide to Firewalls and VPNs, 3rd Edition

Product details:

  • ISBN-10 ‏ : ‎ 1111135398
  • ISBN-13 ‏ : ‎ 978-1111135393
  • Author: Michael E. Whitman, Ph.D

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving you a valuable opportunity to hone and apply your knowledge and skills. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals nationwide.

Table contents:

  1. Ch 1: Introduction to Information Security
  2. Running Case: You Must be Joking
  3. Introduction
  4. What is Information Security?
  5. Critical Characteristics of Information
  6. Security Professionals and the Organization
  7. Key Information Security Terminology
  8. Threats to Information Security
  9. Attacks on Information Assets
  10. Running Case: Connecting the Dots
  11. Chapter Summary
  12. Review Questions
  13. Real World Exercises
  14. Hands-On Projects
  15. Running Case Projects
  16. Endnotes
  17. Ch 2: Security Policies and Standards
  18. Running Case: Why Would we Need a Policy?
  19. Introduction
  20. Information Security Policy, Standards, and Practices
  21. Frameworks and Industry Standards
  22. Security Education, Training, and Awareness Program
  23. Continuity Strategies
  24. Running Case: For Business Use Only
  25. Chapter Summary
  26. Review Questions
  27. Real World Exercises
  28. Hands-On Projects
  29. Running Case Projects
  30. Endnotes
  31. Ch 3: Authenticating Users
  32. Running Case: Getting them to Drink
  33. Introduction
  34. Access Controls
  35. The Authentication Process
  36. How Firewalls Implement the Authentication Process
  37. Centralized Authentication
  38. Password Security Issues
  39. Other Authentication Systems
  40. Running Case: Start at the Beginning
  41. Chapter Summary
  42. Review Questions
  43. Real World Exercises
  44. Hands-On Projects
  45. Running Case Projects
  46. Endnotes
  47. Ch 4: Introduction to Firewalls
  48. Running Case: A $50 Router
  49. Introduction
  50. Firewalls Explained
  51. Types of Firewall Protection
  52. Firewall Categories
  53. Limitations of Firewalls
  54. Running Case: Apology Accepted
  55. Chapter Summary
  56. Review Questions
  57. Real World Exercises
  58. Hands-On Projects
  59. Running Case Projects
  60. Endnotes
  61. Ch 5: Packet Filtering
  62. Running Case: Not My Job
  63. Introduction
  64. Understanding Packets and Packet Filtering
  65. Packet-Filtering Methods
  66. Setting Specific Packet Filter Rules
  67. Running Case: Unauthorized Personnel
  68. Chapter Summary
  69. Review Questions
  70. Real World Exercises
  71. Hands-On Projects
  72. Running Case Projects
  73. Ch 6: Firewall Configuration and Administration
  74. Running Case: The Prohibition Era
  75. Introduction
  76. Establishing Firewall Rules and Restrictions
  77. Firewall Configuration Strategies: A High-Level Overview
  78. Approaches That Add Functionality to the Firewall
  79. Enabling a Firewall to Meet New Needs
  80. Adhering to Proven Security Principles
  81. Remote Management Interface
  82. Configuring Advanced Firewall Functions
  83. Running Case: Actually, We have had a Problem
  84. Chapter Summary
  85. Review Questions
  86. Real World Exercises
  87. Hands-On Projects
  88. Running Case Projects
  89. Endnotes
  90. Ch 7: Working with Proxy Servers and Application-Level Firewalls
  91. Running Case: Gambling with the Company’s Future
  92. Introduction
  93. Overview of Proxy Servers
  94. Benefits of Proxy Servers
  95. Configuring Proxy Servers
  96. Choosing a Proxy Server
  97. Proxy Server-Based Firewalls Compared
  98. Reverse Proxies
  99. When a Proxy Server Isn’t the Correct Choice
  100. Running Case: Busted
  101. Chapter Summary
  102. Review Questions
  103. Real World Exercises
  104. Hands-On Projects
  105. Running Case Projects
  106. Ch 8: Implementing the Bastion Host
  107. Running Case: Dealing with Intruders
  108. Introduction
  109. Installing a Bastion Host: General Requirements
  110. Selecting the Host Machine
  111. Positioning the Bastion Host
  112. Configuring your Bastion Host
  113. Handling Backups
  114. Auditing the Bastion Host
  115. Connecting the Bastion Host
  116. Running Case: Able to Hack it
  117. Chapter Summary
  118. Review Questions
  119. Real World Exercises
  120. Hands-On Projects
  121. Running Case Projects
  122. Endnotes
  123. Ch 9: Encryption-The Foundation for the Virtual Private Network
  124. Running Case: Secret Codes
  125. Introduction
  126. Encryption Overview
  127. Principles of Crytography
  128. Using Cryptographic Controls
  129. Attacks on Cryptosystems
  130. Running Case: I’ll Take One of Those VPN Servers, Too
  131. Chapter Summary
  132. Review Questions
  133. Real World Exercises
  134. Hands-On Projects
  135. Running Case Projects
  136. Endnotes
  137. Ch 10: Setting up a Virtual Private Network
  138. Running Case: Second Time’s a Charm
  139. Introduction
  140. VPN Components and Operations
  141. Types of VPNs
  142. VPN Setups
  143. Tunneling Protocols used with VPNs
  144. Enabling Remote Access Connections within VPNs
  145. VPN Best Practices
  146. Running Case: Thinking Ahead
  147. Chapter Summary
  148. Review Questions
  149. Real World Exercises
  150. Hands-On Projects
  151. Endnotes
  152. Appendix A Setting up and Operating a Software Firewall
  153. Install and Configure Firewall
  154. Modify Default Firewall Rule Sets
  155. Enable SSH Access to the Firewall
  156. Web Proxy Server Configuration
  157. VPN Server Configuration
  158. Glossary
  159. Index

People also search:

guide to firewalls and vpns 3rd edition pdf free

guide to firewalls and vpns 3rd edition

firewall rules best practices

auditing firewalls a practical guide

ubiquiti firewall rules best practices