Firewall design and analysis
Saved in:
Main Author: | Liu, Alex X. |
---|---|
Corporate Author: | ebrary, Inc |
Format: | Electronic eBook |
Language: | English |
Published: |
Hackensack, N.J. :
World Scientific,
2011.
|
Series: | Computer and network security ;
v. 4. |
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Best damn firewall book period
Published: (2007)
Published: (2007)
Cisco Pix firewalls configure, manage and troubleshoot /
by: Behrens, Thorsten
Published: (2005)
by: Behrens, Thorsten
Published: (2005)
Configuring NetScreen Firewalls
by: Cameron, Rob
Published: (2005)
by: Cameron, Rob
Published: (2005)
Firewall policies and VPN configurations
Published: (2006)
Published: (2006)
Configuring SonicWALL firewalls
by: Lathem, Chris
Published: (2006)
by: Lathem, Chris
Published: (2006)
Best damn firewall book period
by: Shinder, Thomas W.
Published: (2003)
by: Shinder, Thomas W.
Published: (2003)
Internet security and firewalls
by: Preetham, V. V.
Published: (2002)
by: Preetham, V. V.
Published: (2002)
Implementing IBM Tivoli Remote Control across firewalls
Published: (2003)
Published: (2003)
Configuring Check Point NGX VPN-1/FireWall-1
by: Stephens, Robert
Published: (2005)
by: Stephens, Robert
Published: (2005)
Linux firewalls attack detection and response with iptables, psad, and fwsnort /
by: Rash, Michael
Published: (2007)
by: Rash, Michael
Published: (2007)
Network security, firewalls, and VPNs /
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
by: El-Bawab, Abd El-Monem A.
Published: (2014)
by: El-Bawab, Abd El-Monem A.
Published: (2014)
pfSense 2 cookbook a practical, example-driven guide to configure even the most advanced features of pfSense 2 /
by: Williamson, Matt
Published: (2011)
by: Williamson, Matt
Published: (2011)
The book of PF a no-nonsense guide to the OpenBSD firewall /
by: Hansteen, Peter N. M.
Published: (2008)
by: Hansteen, Peter N. M.
Published: (2008)
ModSecurity 2.5 securing your Apache installation and web applications /
by: Mischel, Magnus
Published: (2009)
by: Mischel, Magnus
Published: (2009)
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Published: (2003)
Published: (2003)
Configuring ISA server 2000 building firewalls for windows 2000 /
by: Shinder, Thomas W.
Published: (2001)
by: Shinder, Thomas W.
Published: (2001)
Dr. Tom Shinder's configuring ISA Server 2004
by: Shinder, Thomas W., et al.
Published: (2005)
by: Shinder, Thomas W., et al.
Published: (2005)
Cisco security specialist's guide to PIX Firewall
by: Osipov, Vitaly
Published: (2002)
by: Osipov, Vitaly
Published: (2002)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
by: Bradley, Tony
Published: (2006)
by: Bradley, Tony
Published: (2006)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
Designing and building enterprise DMZs
by: Flynn, Hal
Published: (2006)
by: Flynn, Hal
Published: (2006)
CCSP complete study guide 642-501, 642-511, 642-521, 642-531, 642-541 /
Published: (2005)
Published: (2005)
How to cheat at designing security for a Windows Server 2003 network
by: Amini, Rob
Published: (2006)
by: Amini, Rob
Published: (2006)
Secure computer and network systems modeling, analysis and design /
by: Ye, Nong
Published: (2008)
by: Ye, Nong
Published: (2008)
Integrated security systems design concepts, specifications, and implementation /
by: Norman, Thomas L.
Published: (2007)
by: Norman, Thomas L.
Published: (2007)
Use of risk analysis in computer-aided persuasion
Published: (2011)
Published: (2011)
MCSE designing security for a Windows Server 2003 network : exam 70-298 study guide & DVD training system /
Published: (2004)
Published: (2004)
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /
by: Hutchens, Justin
Published: (2014)
by: Hutchens, Justin
Published: (2014)
Security risk management building an information security risk management program from the ground up /
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
The essential guide to home computer security
by: Rowlingson, Robert R.
Published: (2011)
by: Rowlingson, Robert R.
Published: (2011)
Security sage's guide to hardening the network infrastructure
by: Andrés, Steven
Published: (2004)
by: Andrés, Steven
Published: (2004)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
by: Zalewski, Michal
Published: (2005)
by: Zalewski, Michal
Published: (2005)
Network security evaluation using the NSA IEM /
by: Fuller, Ed
Published: (2005)
by: Fuller, Ed
Published: (2005)
Snort 2.0 intrusion detection
by: Beale, Jay
Published: (2003)
by: Beale, Jay
Published: (2003)
Cloud security a comprehensive guide to secure cloud computing /
by: Krutz, Ronald L.
Published: (2010)
by: Krutz, Ronald L.
Published: (2010)
Similar Items
-
Best damn firewall book period
Published: (2007) -
Cisco Pix firewalls configure, manage and troubleshoot /
by: Behrens, Thorsten
Published: (2005) -
Configuring NetScreen Firewalls
by: Cameron, Rob
Published: (2005) -
Firewall policies and VPN configurations
Published: (2006) -
Configuring SonicWALL firewalls
by: Lathem, Chris
Published: (2006)