Building DMZs for Enterprise Networks
This small but very important segment of the network is the section exposed to the public Internet and is the most difficult area on the network to create, and maintain both from an Engineering standpoint and a security standpoint. In this book (the only one of its kind) readers will learn how to make DMZ’s utilizing the IT world’s best of breed software and hardware products from Microsoft, Sun, Cisco, Nokia, and Check Point. This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.
Title: Building DMZs for Enterprise Networks
Author: Robert J. Shimonski; Will Schmied; Thomas W. Shinder; et al.
Programming in Haskell 2016 US$ 32.50 322 pages
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide 2015 US$ 61.50 1104 pages
Computer Age Statistical Inference 2016 US$ 53.99 497 pages