tailieunhanh - configuring isa server phần 1

Tom Shinder (MCSE, MCT) Debra Littlejohn Shinder kỹ thuật biên tập: Martin Grasdal Đăng ký cuốn sách này tại / giải pháp để tận dụng các bản cập nhật miễn phí, Ask Tác giả ™ và nhiều hơn nữa. | ISA Server 1 II II I Building Firewalls for Windows 2000 Everything Yoư Need to Deploy ISA Server in the Enterprise Step tiyStaí Instiurtilini for PtanrwngandOdjgnlngVtxrr liA First Ji Idliun and Deployment Huirfnxfi of Airttìữnticatian Mcthorfi fncnsll Fcstu res. and Setuuiy Alerts Explained Botai Si JWbT-thjrige MM DMD Milled TởVũư pr Thoma w. sn d i Pi bro LiHifjoim ỉn nd Ma iln Ciaidal Technical Filter Global Knowledge Tom Shinder MCSE MCT Debra Littlejohn Shinder Technical Editor Martin Grasdal Register this book at solutions to take advantage of free updates Ask the Author and much more. Login using this keycode KT95QJFD95 copyright 2001 Syngress Publishing Inc Introduction Security is a significant concern for any organization. If the organization has to have a presence on or a connection to the Internet it will also have special needs to protect itself from unwanted intrusion and attacks from malicious and hostile sources. The growth of the Internet has been accompanied by the growth in the numbers and sophistication of hackers and the tools available to them. As many organizations and home users who have a permanent connection to the Internet can attest there is no shortage of people who want to scan ports or break into systems. The wide availability of inexpensive high-bandwidth connections such as cable modems and ADSL has resulted in large increases in the number of people who are continuously connected to the Internet thus increasing their risk for attack. High-bandwidth connections have also made many forms of hacking a lot easier for more people. The wide availability of software designed to compromise the security of systems connected to the Internet is making the risks even greater. Malicious users do not now have to be particularly talented or knowledgeable to compromise systems that lack strong protection. It is against this background that the market for firewall products has exploded. Five or ten years ago there were relatively few

TỪ KHÓA LIÊN QUAN