Designing and Building Enterprise DMZs - 1st Edition - ISBN: 9781597491006, 9780080504001

Designing and Building Enterprise DMZs

1st Edition

Authors: Hal Flynn
eBook ISBN: 9780080504001
Paperback ISBN: 9781597491006
Imprint: Syngress
Published Date: 9th October 2006
Page Count: 737
Tax/VAT will be calculated at check-out Price includes VAT (GST)
61.95
47.95
37.99
61.95
Unavailable
Price includes VAT (GST)
DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.

One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ.

Key Features

  • The only book published on Network DMZs on the components of securing enterprise networks
  • This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point
  • Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures

Readership

Designing and Building Enterprise DMZs: This audience is comprised of engineers and administrators, who: 1. Protect their network and storage data from theft and/or corruption. 2. Ensure both Web-based and internal application and data availability to customers, business partners, and employees. 3. Optimize network hardware, software, storage, and bandwidth resources. They accomplish these tasks by installing, configuring, troubleshooting, and maintaining a combination of commercial and open source firewalls/VPNs, security appliances, Intrusion Detection Systems (IDSs), packet analyzers (Sniffers), and AntiVirus applications. This audience is task oriented and focused on executing IT objectives mandated by their ever-changing business needs.

Table of Contents

1: DMZ Concepts, Layout and Conceptual Design 2: Windows 2000 DMZ Design 3: Solaris DMZ Design 4: Wireless DMZ’s (WDMZs) 5: Firewall Design: Cisco PIX 6: Firewall and DMZ Design: Checkpoint NG 7: Firewall and DMZ Design: Nokia Firewall 8: Firewall and DMZ Design: ISA Server 2000 9: DMZ Router and Switch Security 10: DMZ Based VPN Services 11: Wireless DMZ Implementation 12: Sun Solaris Bastion Hosts 13: Windows 2000 Bastion Hosts 14: Hacking the DMZ 15: Intrusion Detection in the DMZ

Details

No. of pages:
737
Language:
English
Copyright:
© Syngress 2006
Published:
Imprint:
Syngress
eBook ISBN:
9780080504001
Paperback ISBN:
9781597491006

About the Author

Hal Flynn

Affiliations and Expertise

Vulnerability Analyst for Symantec Corporation