Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Mission Critical Internet Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Mission Critical Internet Security

Mission Critical Internet Security

Stace Cunningham

502 pages, parution le 07/11/2001

Résumé

The growth of the Internet and its reach into the fabric of business and personal life has outdistanced most organizations' ability to protect the confidentiality and integrity of information. The increased exposure and the constant escalation of threats to network security have increased the need for effective controls that can restore availability, confidentiality, and integrity to information systems. Mission Critical Internet Security shows how security can be provided in TCP/IP at any layer, and outlines the advantages and disadvantages of each approach.

This book will answer the questions you have about Internet Security, including:

  • If I use protocol switching on my network, what protocol should I use in place of IP?
  • Should I be placing my VPN gateway at the same level as my firewall?
  • Can I use IPSec to secure communications with my Win 9x machines?
  • Are there back doors in PGP?
  • Would a firewall or other security product interfere with the IDS?
  • How does SOCKS Proxy differ from WinSock Proxy?
  • I am setting up my outbound access control lists to specify which traffic I will permit users to use.
  • How do I know which TCP or UDP port a particular application uses?
  • I am setting up my outbound access control lists to specify which traffic I will permit users to use.
  • How do I know which TCP or UDP port a particular application uses?
Contents
  • Chapter 1: Securing Your Internetwork
  • Chapter 2: Internetwork Security Concepts
  • Chapter 3: IPSec
  • Chapter 4: Internet Security Applications
  • Chapter 5: Attacks That Await Your Network
  • Chapter 6: Microsoft RAS and VPN for Windows 2000
  • Chapter 7: Securing Your Network with Microsoft Proxy Server 2.0
  • Chapter 8: Traffic Filtering on Cisco IOS
  • Chapter 9: Configuring and Securing the Cisco PIX Firewall
  • Chapter 10: Axent Technologies Raptor Firewall 6.5
  • Chapter 11: Check Point Software's Check Point FireWall
  • Index

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Stace Cunningham
Parution 07/11/2001
Nb. de pages 502
Format 18,8 x 23,4
Couverture Broché
Poids 900g
Intérieur Noir et Blanc
EAN13 9781928994206

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription