Firewalls for Dummies, 2nd Edition
If you’ve been using the Internet for any length of time, you’ve probably received some unsavory and unsolicited e-mail. If you run a business, you may be worried about the security of your data and your customers’ privacy. At home, you want to protect your personal information from identity thieves and other shady characters. Firewalls For Dummies® will give you the lowdown on firewalls, then guide you through choosing, installing, and configuring one for your personal or bus iness network.
Firewalls For Dummies® helps you understand what firewalls are, how they operate on different types of networks, what they can and can’t do, and how to pick a good one (it’s easier than identifying that perfect melon in the supermarket.) You’ll find out about
- Developing security policies
- Establishing rules for simple protocols
- Detecting and responding to system intrusions
- Setting up firewalls for SOHO or personal use
- Creating demilitarized zones
- Using Windows or Linux as a firewall
- Configuring ZoneAlarm, BlackICE, and Norton personal firewalls
- Installing and using ISA server and FireWall-1
With the handy tips and hints this book provides, you’ll find that firewalls are nothing to fear – that is, unless you’re a cyber-crook! You’ll soon be able to keep your data safer, protect your family’s privacy, and probably sleep better, too.
Ronald Beekelaar is a native of The Nethrellands, makes his living as network security consultant, author, and trainer. Ronald frequently trains network administrators on network design and enterprise security topics. He writes articles for several computer magazines, mostly about operating systems and security issues.
Joern Wettern, PhD, is a native of Germany and is a network consultant and trainer. Joern has also developed a range of training materials for a large software publisher, and these materials are used to train thousands of network administrators around the world. He frequently travels to several continents to speak at computer conferences.
Table of Contents
Part I: Introducing Firewall Basics.
Chapter 1: Why Do You Need a Firewall?
Chapter 2: IP Addressing and Other TCP/IP Basics.
Chapter 3: Understanding Firewall Basics.
Chapter 4: Understanding Firewall Not-So-Basics.
Chapter 5: “The Key Is under the Mat” and Other Common Attacks.
Part II: Establishing Rules.
Chapter 6: Developing Policies.
Chapter 7: Establishing Rules for Simple Protocols.
Chapter 8: Designing Advanced Protocol Rules.
Chapter 9: Configuring “Employees Only” and Other Specific Rules.
Part III: Designing Network Configurations.
Chapter 10: Setting Up Firewalls for SOHO or Personal Use.
Chapter 11: Creating Demilitarized Zones with a Single Firewall.
Chapter 12: Designing Demilitarized Zones with Multiple Firewalls.
Part IV: Deploying Solutions Using Firewall Products.
Chapter 13: Using Windows as a Firewall.
Chapter 14: Configuring Linux as a Firewall.
Chapter 15: Configuring Personal Firewalls: ZoneAlarm, BlackICE, and Norton Personal Firewall.
Chapter 16: Microsoft’s Firewall: Internet Security and Acceleration Server.
Chapter 17: The Champ: Check Point FireWall-1 Next Generation.
Chapter 18: Choosing a Firewall That Meets Your Needs.
Part V: The Part of Tens.
Chapter 19: Ten Tools You Can’t Do Without.
Chapter 20: Ten Web Sites to Visit.
Appendix: Protocol Listings and More.
Sign up now »
- FTTechnical Business AnalystNSW
- FTLead Software EngineerSA
- FTQuality ManagerSA
- FTR&D EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
This report by Tolly tests the system resource requirements of competing vendor solutions when performing on-demand and on-access scanning functions, during distributed definition updates. Click to download how the four ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia