A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is
Information Security Management Handbook, Four Volume Set
Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec © S A N S I n s t i t u t e 2 0 0 0 -2 0 0 2 , A u t h o r r e t a i n s f u l l r i g h t s . Abstract Because hosts are exposed to a variety of threats, there is a growing need for organizations to deploy host-based firewalls across the enterprise. This article outlines the ideal features of a host-based firewall, featuresdoi:10.1201/9780203325438.ch57 fatcat:rpaue6hg7fclvozahxhtyq6cti