Search Results - Firewall (networking)

Refine Results
  1. 1

    Guide to firewalls and network security with intrusion detection VPNs by Holden

    Published 2004
    Book
  2. 2

    Network security, firewalls, and VPNs by Stewart, James Michael

    Published 2014
    Table of Contents: “…Part 1. Foundations of network security: Fundamentals of network security -- Firewall fundamentals -- VPN fundamentals -- Network security threats and issues. …”
    Book
  3. 3

    Network security, firewalls, and VPNs by Stewart, James Michael, Kinsey, Denise

    Published 2021
    Subjects: “…Firewalls (computer Security)…”
    Book
  4. 4

    Building internet firewalls by ZwickylhElizabeth D.

    Book
  5. 5
  6. 6

    Guide to firewalls and VPNs by Whitman, Michael E.

    Published 2012
    Subjects: “…Computer networks Security measures…”
    Serial
  7. 7

    Instruction detection network security beyond the firewall by Escamilla

    Published 1998
    Book
  8. 8

    Guide to firewall and network security with instruction detection and VPNs

    Published 2009
    Book
  9. 9

    Guide to network defense and countermeasures by Holden

    Published 2003
    Subjects: “…Computer network resources…”
    Book
  10. 10

    SonicWALL secure wireless network integrated solutions guide by Tran, Khai

    Published 2008
    Book
  11. 11
  12. 12

    Microsoft Windows server 2008 security resource kit by Johansson, Jesper M.

    Published 2008
    Table of Contents: “…Windows security fundamentals: Subjects, users, and other actors -- Authenticators and authentication protocols -- Objects: the stuff you want -- Understanding user account control (UAC) -- Firewall and network access protection -- Services -- Group policy -- Auditing. …”
    Book
  13. 13

    Network security essentials applications and standards by Stallings, William

    Published 2017
    Table of Contents: “…Malicious Software -- 11. Intruders -- 12. Firewalls…”
    Book
  14. 14

    Network security essentials applications and standards by Stallings, William

    Published 2014
    Table of Contents: “…Ch. 1 Introduction -- Pt. 1 Cryptography -- Ch. 2 Symmetric Encryption and Message Confidentiality -- Ch. 3 Public-Key Cryptography and Message Authentication -- Pt. 2 Network Security Applications -- Ch. 4 Key Distribution an User Authentication -- Ch. 5 Network Access Control and Cloud Security -- Ch. 6 Transport-Level Security -- Ch. 7 Wireless Network Security -- Ch. 8 Electronic Mail Security -- Ch. 9 IP Security -- Pt. 3 System Security -- Ch. 10 Malicious Software -- Ch. 11 Intruders -- Ch. 12 Firewalls -- App. …”
    Book
  15. 15

    Network scanning cookbook practical network security using Nmap and Nessus 7 by Sairam, Jetty

    Published 2018
    Book
  16. 16

    Cryptography and network security principles and practice by Stallings, William

    Published 2014
    Table of Contents: “…Chapter 0 Guide for Readers and Instructors -- Chapter 1 Overview -- Part One Symmetric Ciphers -- Chapter 2 Classical Encryption Techniques -- Chapter 3 Block Ciphers and the Data Encryption Standard -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- Chapter 5 Advanced Encryption Standard -- Chapter 6 Block Cipher Operation -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- Part Two Asymmetric Ciphers -- Chapter 8 More Number Theory -- Chapter 9 Public-Key Cryptography and RSA -- Chapter 10 Other Public-Key Cryptosystems -- Part Three Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- Chapter 12 Message Authentication Codes -- Chapter 13 Digital Signatures -- Part Four Mutual Trust -- Chapter 14 Key Management and Distribution -- Chapter 15 User Authentication -- Part Five Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- Chapter 17 Transport-Level Security -- Chapter 18 Wireless Network Security -- Chapter 19 Electronic Mail Security -- Chapter 20 IP Security -- Appendix A Projects for Teaching Cryptography and Network Security -- Appendix B Sage Examples -- References -- Credits -- Index -- Online Chapters and Appendices1 -- Part Six System Security -- Chapter 21 Malicious Software -- Chapter 22 Intruders -- Chapter 23 Firewalls -- Part seven Legal And Ethical Issues -- Chapter 24 Legal and Ethical Issues -- Appendix C Sage Exercises -- Appendix D Standards and Standards-Setting Organizations -- Appendix E Basic Concepts from Linear Algebra -- Appendix F Measures of Security and Secrecy -- Appendix G Simplified DES -- Appendix H Evaluation Criteria for AES -- Appendix I More on Simplified AES -- Appendix J Knapsack Public-Key Algorithm -- Appendix K Proof of the Digital Signature Algorithm -- Appendix L TCP/IP and OSI -- Appendix M Java Cryptographic APIs -- Appendix N MD5 and Whirlpool Hash Functions -- Appendix O Data Compression Using ZIP -- Appendix P More on PGP -- Appendix Q The International Reference Alphabet -- Appendix R Proof of the RSA Algorithm -- Appendix S Data Encryption Standard (DES) -- Appendix T Kerberos Encryption Techniques -- Appendix U Mathematical Basis of the Birthday Attack -- Appendix V Evaluation Criteria for SHA-3.…”
    Book
  17. 17

    Network defense and countermeasures principles and practices by Easttom, Chuck

    Published 2018
    Book
  18. 18

    Honeypots a new paradigm to information security by Joshi, R.C

    Published 2011
    Subjects: “…Firewalls (computer Security).…”
    Book
  19. 19

    Network security attacks and countermeasures

    Published 2016
    Table of Contents: “…Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda…”
    Book
  20. 20

    Security for wireless ad hoc networks by Anjum, Farooq

    Published 2007
    Book