|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
003 |
AR-LpUFIB |
005 |
20250311170240.0 |
008 |
230201s2011 ag a r 000 0 spa d |
020 |
|
|
|a 9780470939550
|
024 |
8 |
|
|a DIF-M6971
|b 7140
|z DIF002360
|
040 |
|
|
|a AR-LpUFIB
|b spa
|c AR-LpUFIB
|
100 |
1 |
|
|a Miller, Lawrence C.
|
245 |
1 |
0 |
|a Next-generation firewalls for dummies
|
250 |
|
|
|a 1a ed.
|
260 |
|
|
|a Indianapolis :
|b Wiley,
|c c2011
|
300 |
|
|
|a iv, 68 p. :
|b il.
|
500 |
|
|
|a Incluye glosario.
|
505 |
0 |
|
|a Introduction -- About This Book -- Foolish Assumptions -- How This Book Is Organized -- 1. Understanding the Evolution of Network Security -- 2. Defining the Application and Threat Landscape -- 3. Recognizing the Challenges of Legacy Security Infrastructures -- 4. Solving the Problem with Next-Generation Firewalls -- 5. Deploying Next-Generation Firewalls -- 6. Ten Evaluation Criteria for Next-Generation Firewalls -- Glossary -- Icons Used in This Book -- Where to Go from Here -- 1. Understanding the Evolution of Network Security -- Why Legacy Firewalls Are No Longer Effective -- Data Leakage Is a Problem -- Compliance Is Not Optional -- 2. Defining the Application and Threat Landscape -- Applications Are Not All Good or All Bad -- Applications Are Evasive -- Threats Are Coming Along for the Ride -- -- 3. Recognizing the Challenges of Legacy Security Infrastructures -- Whatever Happened to the Firewall? -- Port-based firewalls have poor vision -- Bolt-on functionality is fundamentally flawed -- Firewall "helpers" don’t help -- Traditional IPS Is a Poor Match for Today’s Threats -- UTM Only Makes What Is Broken Cheaper -- It’s Time to Fix the Firewall -- -- 4. Solving the Problem with Next-Generation Firewalls -- The Next-Generation Firewall -- Application identification -- User identification -- Content identification -- Policy control -- High-performance architecture -- What a Next-Generation Firewall Isn’t -- Benefits of Next-Generation Firewalls -- 5. Deploying Next-Generation Firewalls -- Safe Enablement through Smart Policies -- Employee controls -- Desktop controls -- Network controls -- Defining Your Requirements and Developing an RFP -- Deployment Flexibility Matters -- Addressing Mobile and Remote Users -- -- 6. Ten Evaluation Criteria for Next-Generation Firewalls -- Identify Applications, Not Ports -- Identify Users, Not IP Addresses -- Identify Content, Not Packets -- Visibility -- Control -- Performance -- Flexibility -- Reliability -- Scalability -- Manageability -- Glossary
|
650 |
|
4 |
|a FIREWALLS
|
650 |
|
4 |
|a SEGURIDAD EN REDES
|
942 |
|
|
|c BK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 C20_MIL
|7 0
|9 76581
|a DIF
|b DIF
|d 2025-03-11
|i DIF-04367
|l 0
|o C.2.0 MIL
|p DIF-04367
|r 2025-03-11 17:02:40
|w 2025-03-11
|y BK
|
999 |
|
|
|c 52252
|d 52252
|