Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
John Wack, Ken Cutler and Jamie Pole, “Guidelines on Firewalls and Firewall Policy: Recommendations of the National Institute of Standards and Technology,” Computer Security Division, MIS Training Institute, Information Technology Laboratory, National Institute of Standards and Technology, U.S. DePartment of Commerce, Gaithersburg, MD 20899-8930, January 2002.
“Information Security: Mechanisms And Techniques,” Information Security: Technical Solutions, Computer Security Division, MIS Training Institute, Information Technology Laboratory, National Institute of Standards and Technology, U.S. DePartment of Commerce, Gaithersburg, MD 20899-8930, January 2002.
Shirley Radack, Editor, “Selecting Information Technology Security Products,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. DePartment of Commerce, Gaithersburg, MD 20899-8930, 2004.
John R. Vacca and Scott R. Ellis, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2005.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Protecting Servers and Clients with Firewalls. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_29
Download citation
DOI: https://doi.org/10.1007/978-0-387-29844-3_29
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40533-9
Online ISBN: 978-0-387-29844-3
eBook Packages: Computer ScienceComputer Science (R0)
