Limit this search to....

Practical Guide for Implementing Secure Intranets and Extranets
Contributor(s): Phaltankar, Kaustubh M. (Author), Cerf, Vinton G. (Foreword by)
ISBN: 0890064474     ISBN-13: 9780890064474
Publisher: Artech House Publishers
OUR PRICE:   $94.05  
Product Type: Hardcover - Other Formats
Published: November 1999
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Annotation: Here's hands-on methodology for designing effective network-level security systems for corporate intranet or extranet. Using real-world examples and referencing the latest intranet and extranet technology, this essential guidebook for IT professionals shows how to configure network and security elements, such as routers, switches, servers and firewalls, to achieve top-notch security.
Additional Information
BISAC Categories:
- Computers | Security - Online Safety & Privacy
- Computers | Networking - Intranets & Extranets
Dewey: 005.8
LCCN: 99045834
Series: Artech House Telecommunications Library
Physical Information: 1.2" H x 6.32" W x 9.3" (1.82 lbs) 401 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
This volume provides hands-on methodology for designing effective network-level security systems for your corporate intranet or extranet. Using real-world examples and referencing intranet and extranet technology, this guidebook for IT professionals shows how to configure network and security elements such as routers, switches, servers and firewalls to achieve top-notch security. Components of effective security are critically reviewed in detail, including different types of firewalls, such as Packet Filters, Stateful and Application level proxy devices, and encryption schemes, such as DES, RSA, and IPSEC. Secure data transport and data access are also discussed, as well as the use of remote intelligent agents on network devices and servers. The book discusses how to evaluate security options based on requirements such as cost, complexity, and performance, and network and service management issues. It seeks to close the gap between theory and implementation by featuring detailed case studies and an interactive approach with diagrams and configurations.