Engineers and administrators, who: 1) Protect their network and storage data from theft and/or corruption. 2.) Ensure both Web-based and internal application and data availability to customers, business partners, and employees. 3.) Optimize network hardware, software, storage, and bandwidth resources

Table of Contents

Foreword Part I Introduction to Network Security & Firewalls Chapter 1 Introduction to Information Security Introduction Insecurity and the Internet Threats and Attacks Security Policies Creating a Security Policy Protecting Information Technology Using SSL and Secure Shell Other Hardware Security Devices Summary Chapter 2 Firewall Concepts Introduction Defining a Firewall Networking and Firewalls Popular Firewalls Summary Chapter 3 DMZ Concepts, Layout, and Conceptual Design Introduction DMZ Basics DMZ Design Fundamentals Advanced Risks Advanced Design Strategies Summary Chapter 4 Introduction to Intrusion Detection Systems Introduction What is Intrusion Detection? What is an Intrusion? Why Are Intrusion Detection Systems Important? Summary Part II Solaris & Linux Firewalls Chapter 5 Implementing a Firewall with Ipchains and Iptables Introduction Understanding the Need for a Firewall Deploying IP Forwarding and Masquerading Configuring Your Firewall to Filter Network Packets Understanding Tables and Chains in a Linux Firewall Logging Packets at the Firewall Configuring a Firewall Counting Bandwidth Usage Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities Summary Chapter 6 Maintaining Open Source Firewalls Introduction Testing Firewalls Using Telnet, Ipchains, Netcat, and SendIP to Probe Your Firewall Understanding Firewall Logging, Blocking, and Alert Options Obtaining Additional Firewall Logging Tools Summary Chapter 7 Configuring Solaris as a Secur


No. of pages:
© 2003
Print ISBN:
Electronic ISBN: