- ｢予約商品の価格保証｣では、お客様が対象商品を予約注文した時点から発送手続きに入る時点、または発売日のいずれか早い時点までの期間中のAmazon.co.jp の最低販売価格が、お支払いいただく金額となります。予約商品の価格保証について詳しくはヘルプページをご覧ください。 詳細はこちら (細則もこちらからご覧いただけます)
Guide to Firewalls and Vpns (英語) ペーパーバック – 2019/4/1
Kindle 端末は必要ありません。無料 Kindle アプリのいずれかをダウンロードすると、スマートフォン、タブレットPCで Kindle 本をお読みいただけます。
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book also features an abundant selection of realistic projects and cases incorporating cutting-edge technology and current trends, giving you a valuable opportunity to hone and apply your knowledge and skills. GUIDE TO FIREWALLS AND VPNs includes new and updated cases and projects, enhanced coverage of network security and VPNs, and information on relevant National Institute of Standards and Technology guidelines used by businesses and information technology professionals nationwide.
Michael Whitman, Ph.D., CISM, CISSP, is Professor of Information Security at Kennesaw State University, Kennesaw, Georgia. He also serves as the Executive Director of the Center for Information Security Education, Coles College of Business. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU's successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Journal of Cybersecurity Education, Research and Practice, and is Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, Curriculum Development, and Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; and THE GUIDE TO NETWORK SECURITY AND THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an Automated Data Processing System Security Officer (ADPSSO).
Unfortunately, the exercises at the ends of the chapters are a hot mess. It wasn't always clear to me what the review questions were getting at, and when the specific answers they're looking for aren't stated clearly, it's all a big guessing game and not a fun one.
It was the same with some of the real world exercises and hands-on projects.
By far the worst problem, however, is the fact that this book is so far out of date. Project 4-1 tells you that you need a computer running Windows XP or Vista. Project 5-1 needs Vista or XP SP3 *headdesk* Many of the exercises couldn't be completed on my Windows 8 computer. I tried to approximate them as best I could, but whatever I was supposed to find often wasn't where it had been in earlier versions of Windows, and what I got looked drastically different from what the book said. The running case project calls for VirtualBox 3.2.6 for Windows hosts. The current version appears to be 4.3.2 and 3.2.6 isn't available even in legacy builds (although older, unsupported versions are available.) No worries about that because the book also calls for Vyatta VC6.0 - Virtualization ISO for the Vyatta software firewall application that you're supposed to run in VirtualBox. The website given redirects to that of the company that seems to have absorbed or bought out Vyatta. I wasn't able to locate the software firewall. This running case project continues through the book, leaving the student unable to complete a lot of the hands-on exercises that would have given practical skills that weren't covered in the text or in the other books I've used. A pity, because I would have liked to get the experience.