登入選單
返回Google圖書搜尋
Personal Firewalls for Administrators and Remote Users
註釋Annotation -- Will cover products such as Black Ice Defender, Zone Alarm and iptables(linux)among others.

-- Special section on selecting personal firewalls for remote and mobile corporate users as well as for the home systems of corporate users.

-- Explains what protection level and method is best for different circumstances.

While corporate system administrators spend lots of time thinking about enterprise firewall systems for their in-house employees, a vulnerability that is often overlooked is the remote employee's unprotected computer system, the unprotected computers of mobile laptop users (employees on the road) and all those unprotected but networked handheld devices. At the same time, many home computer users who have always relied on high speed Internet access don't realize that without a personal firewall, they too are quite vulnerable to intrusion and attacks. This book is designed to explain how personal firewalls work and how to determine which type of firewall works best in a given situation. Yeo starts with an intro to security basics -basic data protection measures (passwords, virus software, encryption, and firewalls) and reviews common vulnerabilities and issues with the always-on Internet. Yeo then explains protection methods used by firewalls in general - proxy server firewalls, packet filters, signature-based firewalls and stateful inspection-based firewalls while examining strengths and weaknesses of each type. She then explains how each type