Solution Manual for Guide to Firewalls and VPNs, 3rd Edition
Product details:
- ISBN-10 : 1111135398
- ISBN-13 : 978-1111135393
- Author: Michael E. Whitman, Ph.D
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving you a valuable opportunity to hone and apply your knowledge and skills. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals nationwide.
Table contents:
- Ch 1: Introduction to Information Security
- Running Case: You Must be Joking
- Introduction
- What is Information Security?
- Critical Characteristics of Information
- Security Professionals and the Organization
- Key Information Security Terminology
- Threats to Information Security
- Attacks on Information Assets
- Running Case: Connecting the Dots
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 2: Security Policies and Standards
- Running Case: Why Would we Need a Policy?
- Introduction
- Information Security Policy, Standards, and Practices
- Frameworks and Industry Standards
- Security Education, Training, and Awareness Program
- Continuity Strategies
- Running Case: For Business Use Only
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 3: Authenticating Users
- Running Case: Getting them to Drink
- Introduction
- Access Controls
- The Authentication Process
- How Firewalls Implement the Authentication Process
- Centralized Authentication
- Password Security Issues
- Other Authentication Systems
- Running Case: Start at the Beginning
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 4: Introduction to Firewalls
- Running Case: A $50 Router
- Introduction
- Firewalls Explained
- Types of Firewall Protection
- Firewall Categories
- Limitations of Firewalls
- Running Case: Apology Accepted
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 5: Packet Filtering
- Running Case: Not My Job
- Introduction
- Understanding Packets and Packet Filtering
- Packet-Filtering Methods
- Setting Specific Packet Filter Rules
- Running Case: Unauthorized Personnel
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Ch 6: Firewall Configuration and Administration
- Running Case: The Prohibition Era
- Introduction
- Establishing Firewall Rules and Restrictions
- Firewall Configuration Strategies: A High-Level Overview
- Approaches That Add Functionality to the Firewall
- Enabling a Firewall to Meet New Needs
- Adhering to Proven Security Principles
- Remote Management Interface
- Configuring Advanced Firewall Functions
- Running Case: Actually, We have had a Problem
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 7: Working with Proxy Servers and Application-Level Firewalls
- Running Case: Gambling with the Company’s Future
- Introduction
- Overview of Proxy Servers
- Benefits of Proxy Servers
- Configuring Proxy Servers
- Choosing a Proxy Server
- Proxy Server-Based Firewalls Compared
- Reverse Proxies
- When a Proxy Server Isn’t the Correct Choice
- Running Case: Busted
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Ch 8: Implementing the Bastion Host
- Running Case: Dealing with Intruders
- Introduction
- Installing a Bastion Host: General Requirements
- Selecting the Host Machine
- Positioning the Bastion Host
- Configuring your Bastion Host
- Handling Backups
- Auditing the Bastion Host
- Connecting the Bastion Host
- Running Case: Able to Hack it
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 9: Encryption-The Foundation for the Virtual Private Network
- Running Case: Secret Codes
- Introduction
- Encryption Overview
- Principles of Crytography
- Using Cryptographic Controls
- Attacks on Cryptosystems
- Running Case: I’ll Take One of Those VPN Servers, Too
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Running Case Projects
- Endnotes
- Ch 10: Setting up a Virtual Private Network
- Running Case: Second Time’s a Charm
- Introduction
- VPN Components and Operations
- Types of VPNs
- VPN Setups
- Tunneling Protocols used with VPNs
- Enabling Remote Access Connections within VPNs
- VPN Best Practices
- Running Case: Thinking Ahead
- Chapter Summary
- Review Questions
- Real World Exercises
- Hands-On Projects
- Endnotes
- Appendix A Setting up and Operating a Software Firewall
- Install and Configure Firewall
- Modify Default Firewall Rule Sets
- Enable SSH Access to the Firewall
- Web Proxy Server Configuration
- VPN Server Configuration
- Glossary
- Index
People also search:
guide to firewalls and vpns 3rd edition pdf free
guide to firewalls and vpns 3rd edition
firewall rules best practices
auditing firewalls a practical guide
ubiquiti firewall rules best practices