Request for consultation
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The text also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving students the opportunity to hone and apply the knowledge and skills they will need as working professionals. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals.
- The Third Edition features a broader scope of coverage that includes a strong emphasis on hands-on applications of key concepts, provides practical tips and recommendations where appropriate, and covers recent innovations in technology and current methodologies being used by IT professionals today.
- The new edition incorporates the latest guidelines and best practices established by the National Institute of Standards and Technology, enabling students to build familiarity with industry standards used by businesses and professionals nationwide when installing and configuring firewalls.
- Increased focus on firewalls allows for a more streamlined structure, logically adding useful new material on security planning and policy, intrusion detection, VPNs, and related topics.
- The text now includes separate sections on firewalls and VPNs to allow students to explore each topic in depth, from fundamental theory to sophisticated real-world applications. To complement this focused approach, coverage of each topic clearly highlights connections to other relevant material in the text.
- New Hands-On Lab Projects provide exercises on how to specify, configure, and maintain firewalls. Case Exercises reinforce concepts and tie back to the labs using practical, real-world scenarios so students can explore different facets of network security from initial configuration to ongoing maintenance.
- "Chapter Scenario" features open each chapter with a short vignette featuring a fictional company and the information security issues it faces, providing a practical context for the concepts students will soon learn.
- "Offline" and "Technical Details" features interspersed throughout the text present interesting topics and provide additional detail on key technical issues, allowing students to broaden and deepen their knowledge.
- Engaging exercises related to each chapter encourage students to research, analyze, and write responses to questions designed to reinforce learning objectives and enhance comprehension.
- Special "Tips" highlighted throughout the text offer practical, hands-on advice and techniques for handling real-world problems, giving students valuable preparation for situations they are likely to encounter in the workplace.
Part I: INTRODUCTION TO INFORMATION SECURITY.
1. Introduction to Information Security.
2. Network Security Policies and Standards.
3. Authenticating Users.
Part II: FIREWALLS.
4. Introduction to Firewalls.
5. Packet Filtering.
6. Firewall Configuration and Administration.
7. Working with Proxy Servers and Application-Level Firewalls.
8. Selecting and Implementing the Firewall.
Part III: VPNs.
9. Encryption and Firewalls.
10. Setting Up a Virtual Private Network.