Practical Guide to Implementing Secure Intranets and Extranets
Seiten
1999
|
Unabridged edition
Artech House Publishers (Verlag)
978-0-89006-447-4 (ISBN)
Artech House Publishers (Verlag)
978-0-89006-447-4 (ISBN)
- Titel gebraucht verfügbar
- Artikel merken
...gebraucht verfügbar!
This volume provides hands-on methodology for designing effective network-level security systems for corporate intranets or extranets. Using examples and referencing intranet and extranet technology, it shows how to configure network and security elements to achieve top security.
This volume provides hands-on methodology for designing effective network-level security systems for your corporate intranet or extranet. Using real-world examples and referencing intranet and extranet technology, this guidebook for IT professionals shows how to configure network and security elements such as routers, switches, servers and firewalls to achieve top-notch security. Components of effective security are critically reviewed in detail, including different types of firewalls, such as Packet Filters, Stateful and Application level proxy devices, and encryption schemes, such as DES, RSA, and IPSEC. Secure data transport and data access are also discussed, as well as the use of remote intelligent agents on network devices and servers. The book discusses how to evaluate security options based on requirements such as cost, complexity, and performance, and network and service management issues. It seeks to close the gap between theory and implementation by featuring detailed case studies and an interactive approach with diagrams and configurations.
This volume provides hands-on methodology for designing effective network-level security systems for your corporate intranet or extranet. Using real-world examples and referencing intranet and extranet technology, this guidebook for IT professionals shows how to configure network and security elements such as routers, switches, servers and firewalls to achieve top-notch security. Components of effective security are critically reviewed in detail, including different types of firewalls, such as Packet Filters, Stateful and Application level proxy devices, and encryption schemes, such as DES, RSA, and IPSEC. Secure data transport and data access are also discussed, as well as the use of remote intelligent agents on network devices and servers. The book discusses how to evaluate security options based on requirements such as cost, complexity, and performance, and network and service management issues. It seeks to close the gap between theory and implementation by featuring detailed case studies and an interactive approach with diagrams and configurations.
Kaustubh M. Phaltankar is chairman of NetPlexus in Springfield, Virginia, specializing in high resiliency architecture for network implementations and security of intranets and extranets, and previously served as chief architect of MCI's Internet Solutions Center. Mr. Phaltankar received his M.S. in Telecommunications from George Washington University.
Introduction. Network Components of Intranet and Extranet. WAN Components. LAN Components. Service Management. Security Components of Intranet and Extranet. Security. Virtual Private Networks (VPN). Case Studies. Appendices. References.
Erscheint lt. Verlag | 30.11.1999 |
---|---|
Verlagsort | Norwood |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-89006-447-4 / 0890064474 |
ISBN-13 | 978-0-89006-447-4 / 9780890064474 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Buch | Hardcover (2012)
Westermann Schulbuchverlag
34,95 €
Schulbuch Klassen 7/8 (G9)
Buch | Hardcover (2015)
Klett (Verlag)
30,50 €
Buch | Softcover (2004)
Cornelsen Verlag
25,25 €