• Tous les prix incluent la TVA.
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
The Best Damn Firewall Bo... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par tousbouquins
État: D'occasion: Très bon
Commentaire: Expédié par avion depuis les USA; prévoir une livraison entre 10 à 15 jours ouvrables. Satisfait ou remboursé
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

The Best Damn Firewall Book Period (Anglais) Broché – 31 décembre 2007


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 51,64
EUR 48,64 EUR 42,99
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.

Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.

Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.

New to this Edition:

* Microsoft firewall protection, from Windows Firewall to ISA Server 2006
* Cisco PIX Version 7, including VPN configuration and IDS
* Analyzing Firewall Logs and Reports
* VoIP and Firewall Bypassing

Biographie de l'auteur

Dr. Tom Shinder is a 17 year veteran of the IT industry. Prior to entering IT, Dr. Tom graduated from the University of Illinois College of Medicine with a Doctor of Medicine and was a practicing neurologist with special interests in epilepsy and multiple sclerosis. Dr. Tom began his career in IT as a consultant, and has worked with many large companies, including Fina Oil, Microsoft, IBM, HP, Dell and many others. He started his writing career toward the end of the 1990s and has published over 30 books on Windows, Windows Networking, Windows Security and ISA Server/TMG, UAG and Microsoft DirectAccess. For over a decade, ISA Server and TMG were Tom’s passions, and he ran the popular web site www.isaserver.org, in addition to writing 8 books on ISA/TMG. Tom joined Microsoft in December of 2009 as a member of the UAG DirectAccess team and started the popular “Edge Man” blog that covered UAG DirectAccess. He is currently a Principal Knowledge Engineer in the Server and Cloud Division Information Experience Group Solution’s Team and his primary focus now is private cloud - with special interests in private cloud infrastructure and security.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.




Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x8c9b6024) étoiles sur 5 15 commentaires
15 internautes sur 15 ont trouvé ce commentaire utile 
HASH(0x8c6e9c0c) étoiles sur 5 HOLY COW! 24 octobre 2003
Par Brian Downey - Publié sur Amazon.com
Format: Broché
I bought this book because in my job I have to do a lot of installations, configuration, troubleshooting, etc with the various firewalls--and becuase I thought the title was pretty funny. My book came in last week, and I've bee reading it ever since and I have to say it's AMAZING. The things is 1300 pages long and must weigh 5 pounds. It covers PIX, Check Point, ISA, Nokia better than most books just on those things. It's literally like getting 5 or 6 books in one. One of the things I really like about it is that it's much wider than most books, so you can actually lay it open flat and refer to it while doing your configs. I'm studying now for my CCSA also, and this will certainly help with that also. Thanks!
6 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x8c6e9c60) étoiles sur 5 good vendor coverage 28 octobre 2004
Par W Boudville - Publié sur Amazon.com
Format: Broché
I had no idea a book on firewalls could be this big! The authors have striven to write a definitive Handbook (in the German sense of the word). It spans every major implementation, circa 2003 - Cisco, Nokia, Solairs, linux,... Which explains a substantial part of the heft. The firewall market has these major platforms, and there is enough detail on each for you to be able to install and run it.

But the book is more than a set of disparate sections on each vendor. More broadly, it goes into the theory of Intrusion Detection Systems and the common ideas behind most firewalls. You should note that the IDS topic alone is considered sufficiently important by others to have books devoted to it. The level of detail in this book about IDS is not the most comprehensive. But you'll get the gist.

So within the covers of this book, you are getting a broad scope of product information and theory. Even if the book's title is somewhat strident.
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x8c2ed0b4) étoiles sur 5 If you only own one firewall book then own this one 24 novembre 2005
Par Harold McFarland - Publié sur Amazon.com
Format: Broché
While the title says firewall this book does not stop there but also includes an examination of intrusion detection systems. The authors provide very detailed information on specific systems and software such as Check Point NG VPN-1/Firewall, ISA Server, Cisco PIX Firewall, Nokia IP Series Appliances, Linux Firewall, Solaris Secure Router, and Snort. The section on troubleshooting common problems, disaster recovery and system monitoring is excellent and anyone who has spent hours trying to run down some minor problem will tell you it is worth the price of the book just for that piece alone. The book starts with a very good introductory section on information security in general and the history of it as well as the different types of firewalls, attacks, security policies, etc. They then move to firewall concepts, DMZ concepts, layout and design

The Intrusion Detection System part of the book looks at the various network, host-based, and distributed systems and the strengths and weaknesses of each. Although the authors cover many different tools and techniques they really shine in their detailed treatment of ipchains and iptables, as well as the use of utilities like netcat and SendIP

The book is organized into six sections with the first section providing theoretical and general knowledge about firewalls, intrusion detection and security. The second part examines Solaris and Linus Firewalls in detail and the third part looks at PIX Firewalls and the command line interface. The fourth section details the Check Point NG and Nokia IP Series Appliances. The fifth is ISA Server and section six deals with intrusion detection with Snort and its use in combination with a firewall.

This book is designed for the network administrator who needs to implement and oversee a security system and needs to know how to determine the best methods for their network and how to implement them. If you want a single volume that covers firewalls and IDS systems in detail there is no other single reference that even comes close to this one. Best Damn Firewall Book Period is highly recommended and the best single volume firewall book I've seen.
6 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x8c2ed480) étoiles sur 5 Good Enough 22 avril 2004
Par Un client - Publié sur Amazon.com
Format: Broché
This book will help you with basic and intermediate setups of certain firewalls. Of all the commercial firewalls out there, it allows you to look good in front of clients with various types. However to become advanced, I suggest FW speccific bppks.
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x8c2ed210) étoiles sur 5 My shelf fell off the wall! 6 novembre 2003
Par Un client - Publié sur Amazon.com
Format: Broché
Seriously, this huge book is chock full of information on various firewall products. It is well written and technically sound. Anyone who deals with security/networks/firewalls, etc. will think this a good book. And it's huge--good thing Amazon has free shipping...
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?