Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010146058 | QA76.9.A25 T52 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010149714 | QA76.9.A25 T52 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This book solves the need for a resource that illustrates the principles underlying security technology, as well as provides complete hands-on exercises that will serve as valuable practice for users. Based on open-source software, this book is oriented toward the first-time networking reader. Progressive, practical exercises build confidence; SOHO (small-office-home-office) users will also be impressed with the information provided, as for these users the affordability of open-source solutions can be critical. Comprehensive coverage includes: TCP/IP and related protocols, open-source firewalls, services support and applications that firewalls protect, IPsec and TLS-based VPNs, and firewall log and log servers. An excellent reference and resource for network administrators, security administrators, chief security officers, and anyone with the following certifications: SANS, GSEC, MCSE, MCSA, CNE, A+, and Security+.
Author Notes
Dr. Richard W. Tibbs
Dr. Tibbs earned a Ph.D. from George Mason University's College of System and Information Technology Engineering, specializing in operations research. He holds an M.S. in Computer Science and a B.S. in Applied Mathematics from the University of ado, Boulder. His research interests are network security, network and computer capacity planning, queuing theory & simulation, traffic monitoring & analysis, and adaptive routing in telecommunications networks. He is a member of ACM, IEEE, and INFORMS. He has worked in industry, government, and academia for over 20 years before joining Radford University as a full-time faculty member. His industry background includes aerospace, telecommunications, and software development. His government background includes the U.S. Geological Survey, the MITRE Corporation, a federally funded research and development center where he worked on Department of Transportation projects.
Mr. Edward B. Oakes
Mr. Oakes earned a B.S. in Computer Science from Radford University and is currently completing an M.S. in Education with concentration in Technology. In 2004 he was awarded the Anna Lee Stewart Award for Contributions to Faculty Development. He is currently the Director of Academic Computing at Radford University and has over 14 years of experience in networking and security. In addition to other roles, he has served as the Information Security Officer for Radford University for over 5 years. His interests include network security, wireless computing, and incorporating technology into the classroom.
Table of Contents
Preface |
Part 1 Networking Concepts and the TCP/IP Protocol Suite |
Chapter 1 Introduction to Network and Data Link Layer Protocols |
Chapter 2 TCP and UDP in Detail |
Part 2 Firewall Basics |
Chapter 3 Software, Small Office, and Enterprise Firewalls |
Chapter 4 Threats, Packet Filtering, and Stateful Firewalls |
Chapter 5 Illustrated Exercises in Basic Firewall Installation |
Chapter 6 Determining Requirements for the Firewall |
Part 3 VPNS and Logging |
Chapter 7 Introduction to Advanced Firewall Concepts and Terminology |
Chapter 8 Virtual Private Networks |
Chapter 9 Techniques for Integration of Firewall Logs and System Logs |
Appendix A Generating Operating System Images |
Appendix B Initial Lab Setup and Hardware Requirements for Lab Variations |
Appendix C TCP and UDP Port List |
Appendix D ICMP Types |
Appendix E IP Protocol Transport Numbers |
Glossary |
References |