HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Personal firewalls explainedfor remote corporate and home users.
In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these remote systems are at best minimally protected against hackers and other intruders, which means they can provide an easy avenue into the network. An effectiveand cost effectiveway to address this liability is through the use of personal firewalls.
In Personal Firewalls for Administrators and Remote Users, security professional Lisa Yeo presents this vital security technology in a format that system administrators and home users alike can use to zero in on exactly what they need to know to secure their computers against outside intruders. In her clear and engaging style, Yeo explains everything from the basics of home computer security and networking to advanced topics such as interpreting log files and troubleshooting, configuring, and maintaining personal firewalls. Along the way, you'll learn how to choose a personal firewall from the products available today, how to deploy personal firewalls in home and corporate environments, and more. This book describes
This book is appropriate for system administrators; mobile corporate employees using PCs, laptops, and handhelds; as well as savvy home computer users. Coverage includes widely available software packages running on systems including Linux, Windows, and Mac OS.
Preface.
Overview.
Acknowledgments.
1. Security Basics.
Principles of Security. Vulnerabilities, Threats, and Risk. General Security Practices. Firewalls and Personal Firewalls. Summary.
Internet Protocol Address. DHCP and BootP. Internet Protocol Basics. OSI Model. Summary.
Network Address Translation. Static Packet Filter. Stateful Inspection. Application Proxy. Signature-Based Detection. Intrusion Detection. ICSA Certification. Summary.
Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.
Identifying Risks. Assessing Your Needs. Managing Your Firewall. Summary.
Why Log? How Do I Read a Log? Using Logs. Summary.
Configuration Choices. Defensive Postures. Summary.
Basic Troubleshooting. Common Concerns. Uninstalling. Summary.
Hardware. Software.
Firewalls. Intrusion Detection. Networking. Reviews. Security Policy. Index.