Cargando…
Automated firewall analytics: design, configuration and optimization
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the ch...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2203966 |
_version_ | 1780951374826045440 |
---|---|
author | Al-Shaer, Ehab |
author_facet | Al-Shaer, Ehab |
author_sort | Al-Shaer, Ehab |
collection | CERN |
description | This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author |
id | cern-2203966 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Springer |
record_format | invenio |
spelling | cern-22039662021-04-21T19:36:41Zhttp://cds.cern.ch/record/2203966engAl-Shaer, EhabAutomated firewall analytics: design, configuration and optimizationComputing and ComputersThis book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author Springeroai:cds.cern.ch:22039662014 |
spellingShingle | Computing and Computers Al-Shaer, Ehab Automated firewall analytics: design, configuration and optimization |
title | Automated firewall analytics: design, configuration and optimization |
title_full | Automated firewall analytics: design, configuration and optimization |
title_fullStr | Automated firewall analytics: design, configuration and optimization |
title_full_unstemmed | Automated firewall analytics: design, configuration and optimization |
title_short | Automated firewall analytics: design, configuration and optimization |
title_sort | automated firewall analytics: design, configuration and optimization |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2203966 |
work_keys_str_mv | AT alshaerehab automatedfirewallanalyticsdesignconfigurationandoptimization |