Limit this search to....

The Best Damn Firewall Book Period
Contributor(s): Shinder, Thomas W. (Author)
ISBN: 1597492183     ISBN-13: 9781597492188
Publisher: Syngress Publishing
OUR PRICE:   $56.66  
Product Type: Paperback
Published: February 2008
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Annotation: The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.
Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.
Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.
New to this Edition:
* Microsoft firewall protection, from Windows Firewall to ISA Server 2006
* Cisco PIX Version 7, including VPN configuration and IDS
* Analyzing Firewall Logs and Reports
* VoIP and Firewall Bypassing
Additional Information
BISAC Categories:
- Computers | Security - General
Dewey: 005.8
Physical Information: 2.09" H x 7.5" W x 9.22" (4.28 lbs) 1168 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.

Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.

Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.