Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving students the opportunity to hone and apply the knowledge and skills they will need as working professionals. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals.
Table of Contents
Part I: INTRODUCTION TO INFORMATION SECURITY.
1. Introduction to Information Security.
2. Network Security Policies and Standards.
3. Authenticating Users.
Part II: FIREWALLS.
4. Introduction to Firewalls.
5. Packet Filtering.
6. Firewall Configuration and Administration.
7. Working with Proxy Servers and Application-Level Firewalls.
8. Selecting and Implementing the Firewall.
Part III: VPNs.
9. Encryption and Firewalls.
10. Setting Up a Virtual Private Network.