Skip to Main Content
Configuring SonicWALL Firewalls
book

Configuring SonicWALL Firewalls

by Dan Bendell
May 2006
Intermediate to advanced content levelIntermediate to advanced
600 pages
15h 25m
English
Syngress
Content preview from Configuring SonicWALL Firewalls
No matter what device or security you provide, everything usually comes down
to some type of access token, usually a username and password. Using static user
names and passwords is not enough anymore. Even fifteen to thirty days may be too
long to keep the same password.Two-factor authentication, digital certificates, and
personal entropy are leading the march to provide a stronger non-static type of
authentication that is hard to break.
Your network has millions of packets traversing it every day. Do you know what
they are all doing? This is where an intrusion detection or intrusion detection and
prevention device comes into play.These devices detect ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering VMware vSphere 6.7

Mastering VMware vSphere 6.7

Nick Marshall, Mike Brown, G. Blair Fritz, Ryan Johnson
Mastering VMware vSphere 6.7 - Second Edition

Mastering VMware vSphere 6.7 - Second Edition

Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak

Publisher Resources

ISBN: 1597492507