skip to content
Designing and building enterprise DMZs Preview this item
ClosePreview this item
Checking...

Designing and building enterprise DMZs

Author: Hal Flynn
Publisher: Rockland, MA : Syngress Pub., ©2006.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Hal Flynn
ISBN: 9781597491006 1597491004 1281071846 9781281071842 0080504000 9780080504001 9786611071844 6611071849
OCLC Number: 560260803
Language Note: English.
Description: 1 online resource (xxi, 714 pages)
Contents: Front Cover --
Designing and Building Enterprise DMZs --
Copyright Page --
Contents --
Chapter 1. DMZ Concepts, Layout, and Conceptual Design --
Introduction --
Planning Network Security --
DMZ Definitions and History --
Traffic and Security Risks --
Advaced Risks --
Web and FTP Sites --
E-Mail Services --
Advanced Design Stratgies --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 2. Windows DMZ Design --
Introduction --
Introducing Windows DMZ Security --
Building a Windows DMZ --
Windows DMZ Design Planning List --
A Look Forward to Longhorn --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 3. Sun Solaris DMZ Design --
Introduction --
New Features of Sun Solaris 10 --
Placement of Servers --
The Firewall Ruleset --
System Design --
Implementation: The Quick and Dirty Details --
Hardening Checklists for DMZ Servers and Solaris --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 4. Wireless DMZs --
Introduction --
The Need for Wireless DMZs --
Designing the Wireless DMZ --
Wireless DMZ Components --
Wireless DMZ Examples --
Wireless LAN Security Best-Practices Checklist --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 5. Implementing Wireless DMZs --
Introduction --
Implementing RADIUS With Cisco EAP --
Installing and Configuring Juniper Steel-Belted RADIUS --
Windows Active Directory Domain Authentication With LEAP and RADIUS --
Implementing PEAP --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 6. Firewall Design: Cisco PIX and ASA --
Introduction --
PIX and ASA Basics --
Securing Your Network Perimeters --
Cisco PIX/ASA Versions and Features --
Making a DMZ and Controlling Traffic --
PIX/ASA Configuration Basics --
Configuring Advanced PIX/ASA Features --
PIX/ASA Firewall Design and Configuration Checklist --
Summary. Solutions Fast Track --
Frequently Asked Questions --
Chapter 7. Firewall and DMZ Design: Check Point --
Introduction --
Basics of Check Point Firewalls --
Securing Your Network Perimeters --
Configuring Your DMZ --
Configuring the Firewall --
Configuring the Security Rulebase --
Configuring the Address Translation Rulebase --
Configuring Networkand Application Protections --
Check Point NG Secure DMZ Checklist --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 8. Firewall and DMZ Design: SecurePlatform and Nokia Firewalls --
Introduction --
Basics of SecurePlatform Firewalls --
Basics of Nokia Firewalls --
Using cpconfig --
Nokia Firewall and DMZ Design Checklist --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 9. Firewall and DMZ Design: Juniper NetScreen --
Introduction --
NetScreen Basics --
Securely Managing Juniper NetScreen Firewalls --
NetScreen Configuration Basics --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 10. Firewall and DMZ Design: ISA Server 2005 --
Introduction --
Network Services Segment Configuration Options --
Scenario 1 : A LAN Router between the ISA Firewall and Corporate Network --
ISA Firewall Stateful Packet Inspection and Request/Response Paths --
Multiple Departmental Networks/Security Zones Connected to a Backbone Network --
Example Network and Perimeter Network Design --
Creating the ISA Representing the Corporate Network on the Network Services Perimeter --
Creating the Corpnet ISA Firewall Network --
Creating the Rule on the Network Services Perimeter ISA, Setting a Route Relationship between the Corporate Network and Network Services Segment --
Creating an Intradomain Communications Access Rule on the Network Services Perimeter ISA Firewall and a DNS Server Publishing Rule. Creating Access Rules Controlling Outbound Access from the Network Services Segment on the Perimeter ISA Firewall --
Creating the Network Services Access Rules Enabling Corpnet Clients Access to Network Services --
Configuring the Default Internal Network on the Edge ISA Firewall --
Creating a Routing Table Entry on the Edge ISA Firewall --
Joining the Edge ISA Firewall to the Domain --
Creating Access Rules on the Edge ISA Firewall, Controlling Outbound Access from Corpnet Hosts and Hosts on the Network Services Segment --
Creating Publishing Rules on the Edge ISA FirewaU to Allow Inbound Connections to the Exchange Server Mail Services --
Creating a Routing Table Entry on Network Clients (Required Only If No LAN Routers Are Installed) --
Joining the Network Clients to the Domain --
Creating and Configuring DNS Entries in the Domain DNS, Including WPAD Entries --
Configuring the Firewall and Web Proxy Client Settings on the Edge ISA Firewall, and Enabling Autodiscovery --
Installing the Firewall Client Share on the Network Services Segment File Server --
Installing the Firewall Client on the Network Clients --
Connecting the Corporate Network Clients to Resources on the Network Services Segment and the Internet --
Summary --
Chapter 11. DMZ Router and Switch Security --
Introduction --
Securing the Router --
Securing the Switch --
IOS Bugs and Security Advisories --
DMZ Router and Switch Security Best-Practice Checklists --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 12. DMZ-Based VPN Services --
Introduction --
VPN Services in the DMZ --
Designing an IPSec Solution --
Connecting B2B Sites --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 13. Windows Bastion Hosts --
Introduction --
Configuring Bastion Hosts --
Testing Bastion Host Security --
Configuration Fundamentals --
Remote Administration. Bastion Host Configurations --
Bastion Host Maintenance and Support --
Windows Bastion Host Checklist --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Chapter 14. Linux Bastion Hosts --
Introduction --
System Installation --
Removing Optional Components --
Additional Steps --
Controlling Access to Resources --
Auditing Access to Resources --
Remote Administration --
Bastion Host Configurations --
Bastion Host Maintenance and Support --
Linux Bastion Host Checklist --
Summary --
Solutions Fast Track --
Frequently Asked Questions --
Index.
Responsibility: Hal Flynn.

Abstract:

Provides information on building network demilitarized zone (DMZ) segments, which are the cornerstone of any good enterprise security configuration. This book covers market-leading products from  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/560260803<\/a>> # Designing and building enterprise DMZs<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"560260803<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Place\/rockland_ma<\/a>> ; # Rockland, MA<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/mau<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1751426<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Topic\/computer_networks_security_measures<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2008104644<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872341<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Topic\/business_enterprises_computer_networks<\/a>> ; # Business enterprises--Computer networks<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2006<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Person\/flynn_hal<\/a>> ; # Hal Flynn<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2006<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. \u00C2\u00B7 The only book published on Network DMZs on the components of securing enterprise networks \u00C2\u00B7 This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point \u00C2\u00B7 Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Front Cover -- Designing and Building Enterprise DMZs -- Copyright Page -- Contents -- Chapter 1. DMZ Concepts, Layout, and Conceptual Design -- Introduction -- Planning Network Security -- DMZ Definitions and History -- Traffic and Security Risks -- Advaced Risks -- Web and FTP Sites -- E-Mail Services -- Advanced Design Stratgies -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Windows DMZ Design -- Introduction -- Introducing Windows DMZ Security -- Building a Windows DMZ -- Windows DMZ Design Planning List -- A Look Forward to Longhorn -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Sun Solaris DMZ Design -- Introduction -- New Features of Sun Solaris 10 -- Placement of Servers -- The Firewall Ruleset -- System Design -- Implementation: The Quick and Dirty Details -- Hardening Checklists for DMZ Servers and Solaris -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Wireless DMZs -- Introduction -- The Need for Wireless DMZs -- Designing the Wireless DMZ -- Wireless DMZ Components -- Wireless DMZ Examples -- Wireless LAN Security Best-Practices Checklist -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Implementing Wireless DMZs -- Introduction -- Implementing RADIUS With Cisco EAP -- Installing and Configuring Juniper Steel-Belted RADIUS -- Windows Active Directory Domain Authentication With LEAP and RADIUS -- Implementing PEAP -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Firewall Design: Cisco PIX and ASA -- Introduction -- PIX and ASA Basics -- Securing Your Network Perimeters -- Cisco PIX\/ASA Versions and Features -- Making a DMZ and Controlling Traffic -- PIX\/ASA Configuration Basics -- Configuring Advanced PIX\/ASA Features -- PIX\/ASA Firewall Design and Configuration Checklist -- Summary.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/3770416092<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/3770416092#CreativeWork\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Designing and building enterprise DMZs<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"560260803<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/560260803#PublicationEvent\/rockland_ma_syngress_pub_2006<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Agent\/syngress_pub<\/a>> ; # Syngress Pub.<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proxy.library.carleton.ca\/login?url=http:\/\/proquest.safaribooksonline.com\/?uiCode=carleton&xmlId=1597491004<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=170637<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/login.gbcprx01.georgebrown.ca\/login?url=https:\/\/ebookcentral.proquest.com\/lib\/georgebrown-ebooks\/detail.action?docID=319198<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.myilibrary.com?id=107184<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.tech.safaribooksonline.de\/1597491004<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=319198<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.safaribooksonline.com\/1597491004<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/swbplus.bsz-bw.de\/bsz355391406cov.htm<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.myilibrary.com?id=107184&ref=toc<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/site.ebrary.com\/id\/10142563<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.sciencedirect.com\/science\/book\/9781597491006<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9786611071844<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780080504001<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781281071842<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781597491006<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/560260803<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Agent\/syngress_pub<\/a>> # Syngress Pub.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Syngress Pub.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Person\/flynn_hal<\/a>> # Hal Flynn<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Flynn<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Hal<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Hal Flynn<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Place\/rockland_ma<\/a>> # Rockland, MA<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rockland, MA<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Topic\/business_enterprises_computer_networks<\/a>> # Business enterprises--Computer networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Business enterprises--Computer networks<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Topic\/computer_networks_security_measures<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2008104644<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/mau<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"mau<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1751426<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872341<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/proxy.library.carleton.ca\/login?url=http:\/\/proquest.safaribooksonline.com\/?uiCode=carleton&xmlId=1597491004<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Safari (Access restricted to 5 simultaneous users)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/3770416092#CreativeWork\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/560260803<\/a>> ; # Designing and building enterprise DMZs<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780080504001<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0080504000<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780080504001<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781281071842<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1281071846<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781281071842<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781597491006<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1597491004<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781597491006<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9786611071844<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"6611071849<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9786611071844<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/560260803<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/560260803<\/a>> ; # Designing and building enterprise DMZs<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2021-03-17<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/560260803#PublicationEvent\/rockland_ma_syngress_pub_2006<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Place\/rockland_ma<\/a>> ; # Rockland, MA<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3770416092#Agent\/syngress_pub<\/a>> ; # Syngress Pub.<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n