Website Name, Address & Description |
Research It! |
http://www.newpaltz.edu/resnet/fire.html Site explains firewalls and how they protect networked computers from intentional and unauthorized access.
| |
http://www.interhack.net/pubs/fwfaq/ Internet Firewalls: Frequently Asked Questions.
| |
http://csrc.nist.gov/isptg/html/ISPTG-6.html NIST site recommendations for helping organizations who have connected or want to connect their private LANs to the Internet so that their users can have convenient access to Internet services, since the Internet as a whole is not trustworthy, their private systems are vulnerable to misuse and attack an a firewall is a safeguard one can use to control access between a trusted network and a less trusted one.
| |
http://csrc.nist.gov/publications/nistpubs/800-10/ As an introduction to Internet firewalls this is an overview of the Internet and security-related problems and of firewall components with several types of network access policies addressed as well as technical implementations of those policies.
| |
http://ciac.llnl.gov/ciac/ToolsUnixFirewalls.html From Computer Incident Advisory Capability of the US Department of Energy which offers downloadable UNIX firewall utilities and software.
| |
http://www.lanl.gov/lanp/research.html Advanced Networking Research and Development current research into effort focuses on alleviating the network bottleneck at the network endpoints by placing the network interface card onto the computers system bus and accessing it as memory rather than as an I/O device.
| |
http://www.kmj.com/nic.html Cards listed by network topology, cards listed by bus and cards listed by vendor links to image and information on all different NIC cards.
| |
http://www.linfield.edu/~darnett/helpages/NICinstall/NICStart.html Instructions for installing network interface cards and devices are intended to complement your computers manuals and to assist you with the installation.
| |
http://www.webopedia.com/TERM/n/network_interface_card_NIC.html This page describes the term network interface card and lists other pages on the Web where you can find additional information.
| |
http://www.computerhope.com/network/nic.htm Linking to other various locations on the Internet with information about computer network cards.
| |
http://www.hub-tech.net/ A definitive site for learning how to set up a computer network with information on computer networking, the Internet and network terminology.
| |
http://www.utoledo.edu/utnet/network/switches.html Definition of a switch as a network device which segregates (filters) network traffic by user and as such, it makes each network link more efficient, as it does not transmit data where it does not belong.
| |
http://www.hp.com/rnd/index.html A commercial site which specializes in hubs and switches.
| |
http://faculty.philau.edu/mawm/Netwk%20Comp/NtwkComp%20Hubs.htm Overview of hubs and information resources.
| |
http://faculty.philau.edu/mawm/Netwk%20Comp/NtwkComp%20Switch%20Hubs Overview of switches and information resources.
| |
http://faculty.philau.edu/mawm/Netwk Comp/NtwkComp Overview of information on network bridges.
| |
http://www.ssimail.com/Glossary.htm Technical terms and acronyms used in software development in the areas of connectivity, gateways, messaging and network security.
| |
http://www.linuxrouter.org/ Linux Router Project (LRP) is a networking-centric micro-distribution of Linux and is small enough to fit on a single 1.44MB floppy disk, and makes building and maintaining routers, access servers, thin servers, thin clients, network appliances, and typically embedded systems inexpensive, easy and secure on an open source platform.
| |
http://www.scit.wlv.ac.uk/~jphb/comms/iproute.html Explanation of is the technique by which data finds its way from one host computer to another.
| |
http://www.cisco.com/ Cisco is the worldwide leader in networking hardware for the Internet and its products line includes reliable hubs routers and gateways.
| |
http://www.cisco.com/warp/public/701/64.html
| |
http://www.cisco.com/warp/public/707/sec_incident_response.shtml
| |
http://www.cisco.com/warp/public/707/21.html
| |
http://ciac.llnl.gov/ciac/bulletins/d-15.shtml Vulnerability in Cisco Routers Used as Firewalls.
| |
http://faculty.philau.edu/mawm/Netwk%20Comp/NtwkComp%20Gateways.htm Overview of network gateways.
| |
http://faculty.philau.edu/mawm/Netwk%20Comp/NtwkComp%20Routers.htm Overview of network routers.
| |
http://www-lblnet.lbl.gov/LBLnet/vpn/whatisvpn.htm Definition of a virtual private network starting with describing VPN as a network built for the private use of a particular enterprise or institution over the shared public infrastructure.
| |
http://comm.ncifcrf.gov/networking/vpn/vpn.html Government site about virtual private network (VPN) describing it as a client tunnel with an encrypted path through the Internet between two endpoints, one a host running a VPN service and a client running an appropriate client, which link to provide a secure communications channel for computer traffic between the two endpoints.
| |
http://sunsite.auc.dk/vpnd Free copy of open source Virtual Private Network Daemon for Linux.
| |
http://www.epm.ornl.gov/~dunigan/vpn.html Researcher at the Computer Science and Mathematics Division of the Oak Ridge National Laboratory describes IP-based virtual private networks as an encrypted connection between a users distributed sites over a public network (e.g., the Internet).
| |
http://www.firstvpn.com/ A commercial site offers resources for VPN network design, implementation, and management for service providers and end-users. Lists over 200 VPN white papers.
| |
http://www.webproforum.com/vpn Find a definition and overview of VPNs and read about benefits, technologies and solutions with glossary of VPN terms from commercial site.
| |