Next-generation firewalls for dummies

Detalles Bibliográficos
Autor Principal: Miller, Lawrence C.
Formato: Libro
Lengua:español
Datos de publicación: Indianapolis : Wiley, c2011
Edición:1a ed.
Temas:
Acceso en línea:Consultar en el Cátalogo
Notas:Incluye glosario.
Descripción Física:iv, 68 p. : il.
ISBN:9780470939550

MARC

LEADER 00000nam a2200000 a 4500
003 AR-LpUFIB
005 20250311170240.0
008 230201s2011 ag a r 000 0 spa d
020 |a 9780470939550 
024 8 |a DIF-M6971  |b 7140  |z DIF002360 
040 |a AR-LpUFIB  |b spa  |c AR-LpUFIB 
100 1 |a Miller, Lawrence C. 
245 1 0 |a Next-generation firewalls for dummies 
250 |a 1a ed. 
260 |a Indianapolis :  |b  Wiley,  |c c2011 
300 |a iv, 68 p. :  |b il. 
500 |a Incluye glosario. 
505 0 |a  Introduction -- About This Book -- Foolish Assumptions -- How This Book Is Organized -- 1. Understanding the Evolution of Network Security -- 2. Defining the Application and Threat Landscape -- 3. Recognizing the Challenges of Legacy Security Infrastructures -- 4. Solving the Problem with Next-Generation Firewalls -- 5. Deploying Next-Generation Firewalls -- 6. Ten Evaluation Criteria for Next-Generation Firewalls -- Glossary -- Icons Used in This Book -- Where to Go from Here -- 1. Understanding the Evolution of Network Security -- Why Legacy Firewalls Are No Longer Effective -- Data Leakage Is a Problem -- Compliance Is Not Optional -- 2. Defining the Application and Threat Landscape -- Applications Are Not All Good or All Bad -- Applications Are Evasive -- Threats Are Coming Along for the Ride -- -- 3. Recognizing the Challenges of Legacy Security Infrastructures -- Whatever Happened to the Firewall? -- Port-based firewalls have poor vision -- Bolt-on functionality is fundamentally flawed -- Firewall "helpers" don’t help -- Traditional IPS Is a Poor Match for Today’s Threats -- UTM Only Makes What Is Broken Cheaper -- It’s Time to Fix the Firewall -- -- 4. Solving the Problem with Next-Generation Firewalls -- The Next-Generation Firewall -- Application identification -- User identification -- Content identification -- Policy control -- High-performance architecture -- What a Next-Generation Firewall Isn’t -- Benefits of Next-Generation Firewalls -- 5. Deploying Next-Generation Firewalls -- Safe Enablement through Smart Policies -- Employee controls -- Desktop controls -- Network controls -- Defining Your Requirements and Developing an RFP -- Deployment Flexibility Matters -- Addressing Mobile and Remote Users -- -- 6. Ten Evaluation Criteria for Next-Generation Firewalls -- Identify Applications, Not Ports -- Identify Users, Not IP Addresses -- Identify Content, Not Packets -- Visibility -- Control -- Performance -- Flexibility -- Reliability -- Scalability -- Manageability -- Glossary 
650 4 |a FIREWALLS 
650 4 |a SEGURIDAD EN REDES 
942 |c BK 
952 |0 0  |1 0  |4 0  |6 C20_MIL  |7 0  |9 76581  |a DIF  |b DIF  |d 2025-03-11  |i DIF-04367  |l 0  |o C.2.0 MIL  |p DIF-04367  |r 2025-03-11 17:02:40  |w 2025-03-11  |y BK 
999 |c 52252  |d 52252