What the book covers: Detailed professionals guide to all aspects of firewalls including threat analysis, firewall architecture, application level details, encryption, authentication, coverage of various firewall products (Checkpoint, BorderManager, Linux, ISA and more) and administration and support from the first steps of setting up a firewall to setting up and analyzing logs generated by a firewall.* Includes both detection and prevention perspectives - details how to use a firewalls to detect a potential hack and prevent through denial of access.* Shows how to maximize caching and load-balancing with firewalls.* Coverage includes fine-tuning firewalls to work with other security solutions including VPNs, PKI, PGP.* Cross-platform coverage includes WinNT/2000, NetWare, Linux, Unix and all types of servers(FTP, Telnet, Web etc.)* Appendix includes detailed information on making firewalls compliant with all protocols(IPv4, Ipv6, TCP/IP, IP/SPX, NetBEUI, AppleTalk) and security standards (Common Criteria, IPSec, ESP, AH, Security Association).
Computers-Technology, Security-Encryption, Encryption,