Skip to content

Firewall Fundamentals

Best in textbook rentals since 2012!

ISBN-10: 1587052210

ISBN-13: 9781587052217

Edition: 2006

Authors: Wes Noonan, Ido Dubrawsky, Wes Noonan

List price: $59.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against…    
Customers also bought

Book details

List price: $59.99
Copyright year: 2006
Publisher: Cisco Press
Publication date: 6/2/2006
Binding: Paperback
Pages: 408
Size: 7.30" wide x 8.90" long x 1.10" tall
Weight: 1.760
Language: English

Introduction
Introduction to Firewalls3
Introduction to Firewalls What Is a Firewall? What Can Firewalls Do?
Firewalls Manage and Control Network Traffic
Firewalls Authenticate Access
Firewalls Act as an Intermediary
Firewalls Protect Resources
Firewalls Record and Report on Events What Are the Threats?
Targeted Versus Untargeted Attacks
Viruses, Worms, and Trojans
Malicious Content and Malware
Denial of Service
Zombies
Compromise of Personal Information and Spyware
Social Engineering
New Attack Vectors
Insecure/Poorly Designed Applications What Are the Motives? Security Policies
Examples of Security Policies
Firewalls and Trust Determining If You Need a Firewall Summary
Firewall Basics Firewall Taxonomy
Personal Firewalls
Network Firewalls Firewall Products
Software Firewalls
Appliance Firewalls
Integrated Firewalls Firewall Technologies
Personal Firewalls
Packet Filters
NAT Firewalls
Circuit-Level Firewalls
Proxy Firewalls
Stateful Firewalls
Transparent Firewalls
Virtual Firewalls Open and Closed Source Firewalls Summary
TCP/IP for Firewalls Protocols, Services, and Applications
The OSI Model
The Department of Defense (DoD) Model
How Firewalls Use Protocols, Applications, and Services Internet Protocol (IP)
IP Packet Structure
The IP Packet Header
Bad IP Packets Transmission Control Protocol (TCP)
TCP Segment Structure
TCP Segment Header
Bad TCP User Datagram Protocol (UDP)
UDP Message Structure
UDP Datagram Header
Bad UDP Internet Control Message Protocol (ICMP)
ICMP Message Structure
Bad ICMP Addressing in IP Networks
Physical Addresses
Logical Addresses
IP Addressing
Subnets
IPv6 Network Address Translation (NAT) NAT Implementations
NAT and IPsec: The Issues and the Solutions Broadcast and Multicast IP Services IP Routing
Types of Routing
How the IP Routing Process Works
Different Classes of Routing Protocols
Common Routing Protocols Applications Using IP
Common Applications Using IP
Less-Common Applications Using IP
Protocols Used to Implement Security Summary
How Firewalls Work
Personal Firewalls: Windows Firewall and Trend Micros PC-cillin Windows Firewall and Windows XP
How Windows Firewall Works
Configuring Windows Firewall
Windows Firewall Features
Windows Firewall Checklist Trend Micros PC-cillin Firewall Feature
PC-cillin Requirements
How the Trend Micro Firewall Works
Configuring the Trend Micro Firewall
Trend Micro Firewall Features
Trend Micro Firewall Checklist Summary
Broadband Routers and Firewalls How Broadband Routers and Firewalls Work Linksys Broadband Routers/Firewalls
Security and Filtering Features
Routing Features
Management and Administration Features
Miscellaneous Features Linksys Requirements How the Linksys Router/Firewall Works