You should buy this book. Then you should read this book.
Firewalls and Internet Security: Repelling the Wily Hacker
โ Scribed by William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin
- Publisher
- Addison-Wesley Professional
- Year
- 2003
- Tongue
- English
- Leaves
- 457
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers.Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion.The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and descriptions of the tools and techniques used to perpetrate these attacks and to prevent them. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through an examination of problems and practices on today's intranets and discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions for the future of firewalls and Internet security. Appendices provide an introduction to cryptography and a list of resources readers can rely on to track further developments in Internet security. The book's Website will update these resources. Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make the security decisions that will make the Internet - and their computers - safer.
โฆ Table of Contents
Contents......Page 8
Part I Getting Started......Page 22
01 Introduction......Page 24
02 Security Review of Protocols:......Page 40
03 Security Review: Upper Layers......Page 62
04 The Web: Threat or Menance?......Page 94
Part II The Threats......Page 114
05 Classes of Attacks......Page 116
06 Hacker's Workbench.........Page 140
Part III Safer Tools & Service......Page 156
07 Authentication......Page 158
08 Using Some Tools & Services......Page 174
Part IV Firewalls & VPNs......Page 194
09 Kinds of Firewalls......Page 196
10 Filtering Services......Page 218
11 Firewall Engineering......Page 232
12 Tunneling & VPNs......Page 254
Part V Protecting an Organization......Page 266
13 Network Layout......Page 268
14 Safe Hosts in a Hostile Environment......Page 280
15 Intrusion Detection......Page 300
Part VI Lessons Learned......Page 306
16 An Evening with Berferd......Page 308
17 The Taking of Clark......Page 322
18 Secure Communications......Page 334
19 Where Do We Go from Here?......Page 350
Part VII Appendixes......Page 354
A: An Intro to Cryptography......Page 356
B: Keeping Up......Page 370
Bibliography......Page 376
List of โขbombsโข......Page 410
List of Acronyms......Page 412
Index......Page 418
๐ SIMILAR VOLUMES
Implementing a firewall is the firs step in securing your network. This book will show you how to construct an effective firewall and teach you other methods to protect your company network. Internet Security and Firewalls gives you the knowledge you need to keep your network safe and gain a compe
<I>Internet Firewalls and Network Security</I> succeeds precisely because of its restricted focus: half of this book is devoted to firewalls and packet filters. After a comprehensive introduction to the architecture and theory of firewalls, the guide documents several commercial and noncommercial pa
This book shows how computer security is implemented and the ways in which it can be side-stepped by trespassers.Details ways to catch hackers and limit their accessVital coverage provided for all Internet and private host sitesCD-ROM includes software from Black Hole allowing users to build their o
This book shows how computer security is implemented and the ways in which it can be side-stepped by trespassers. * Details ways to catch hackers and limit their access * Vital coverage provided for all Internet and private host sites * CD-ROM includes software from Black Hole allowing user