Personal Firewalls for Administrators and Remote Users

Personal Firewalls for Administrators and Remote Users

4 (1 rating by Goodreads)
By (author) 

List price: US$37.50

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

-- Will cover products such as Black Ice Defender, Zone Alarm and iptables(linux)among others.-- Special section on selecting personal firewalls for remote and mobile corporate users as well as for the home systems of corporate users.-- Explains what protection level and method is best for different circumstances.While corporate system administrators spend lots of time thinking about enterprise firewall systems for their in-house employees, a vulnerability that is often overlooked is the remote employee's unprotected computer system, the unprotected computers of mobile laptop users (employees on the road) and all those unprotected but networked handheld devices. At the same time, many home computer users who have always relied on high speed Internet access don't realize that without a personal firewall, they too are quite vulnerable to intrusion and attacks. This book is designed to explain how personal firewalls work and how to determine which type of firewall works best in a given situation. Yeo starts with an intro to security basics -basic data protection measures (passwords, virus software, encryption, and firewalls) and reviews common vulnerabilities and issues with the always-on Internet. Yeo then explains protection methods used by firewalls in general - proxy server firewalls, packet filters, signature-based firewalls and stateful inspection-based firewalls while examining strengths and weaknesses of each type. She then explains how each type of protection method is implemented in a "personal" firewall, the various products including Black Ice Defender, Zone Alarm, Linux iptables that use a given firewall method, and the pros and cons of relying on this method in apersonal firewall. An entire chapter is devoted to maintenance of personal firewalls.
show more

Product details

  • Paperback | 240 pages
  • 152.4 x 229.6 x 16.8mm | 381.02g
  • Prentice Hall
  • Upper Saddle River, United States
  • English
  • 0130462225
  • 9780130462220

Table of contents

Preface. Overview. Acknowledgments. 1. Security Basics. Principles of Security. Vulnerabilities, Threats, and Risk. General Security Practices. Firewalls and Personal Firewalls. Summary.2. Networking Basics. Internet Protocol Address. DHCP and BootP. Internet Protocol Basics. OSI Model. Summary.3. Personal Firewalls. Network Address Translation. Static Packet Filter. Stateful Inspection. Application Proxy. Signature-Based Detection. Intrusion Detection. ICSA Certification. Summary.4. Personal Firewalls at Home. Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.5 Personal Firewalls at Work. Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.6. Logs. Why Log? How Do I Read a Log? Using Logs. Summary.7. Configuration Options. Configuration Choices. Defensive Postures. Summary.8. Troubleshooting. Basic Troubleshooting. Common Concerns. Uninstalling. Summary.Appendix A: Firewall Comparison. Hardware. Software.Glossary. Bibliography. Firewalls. Intrusion Detection. Networking. Reviews. Security Policy. Index.
show more

About Lisa Yeo

LISA YEO is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing a corporate firewall. Since that time, she has acquired the Global Information Assurance Certification (GIAC) Security Essentials and Windows certifications. Lisa currently sits on the GIAC Windows (GCWN) Board.
show more

Rating details

1 ratings
4 out of 5 stars
5 0% (0)
4 100% (1)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X