Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Inside Network Perimeter SecurityInside Network Perimeter Security

Inside Network Perimeter Security

Lenny Zeltser, Scott Winters, Stephen Northcutt, Ronald W. Ritchey, Karen Kent

4.0(1)on Hardcover

About this book

Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.

Details

OL Work ID
OL21398013W

Subjects

Computer networks, security measuresComputer networksSecurity measuresComputer networks--security measuresTk5105.59 .i53 2005005.8

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.