,

Building Internet Firewalls 2e

Paperback Engels 2000 9781565928718
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.What kinds of security threats does the Internet pose Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:Firewall technologies: packet filtering, proxying, network address translation, virtual private networksArchitectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewallsIssues involved in a variety of new Internet services and protocols through a firewallEmail and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)File transfer and sharing services such as NFS, SambaRemote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)The book's complete list of resources includes the location of many publicly available firewall construction tools.

Specificaties

ISBN13:9781565928718
Taal:Engels
Bindwijze:paperback
Aantal pagina's:896

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Preface

Part I: Network Security

Chapter 1: Why Internet Firewalls?

Chapter 2: Internet Services

Chapter 3: Security Strategies

Part II: Building Firewalls

Chapter 4: Packets and Protocols

Chapter 5: Firewall Technologies

Chapter 6: Firewall Architectures

Chapter 7: Firewall Design

Chapter 8: Packet Filtering

Chapter 9: Proxy Systems

Chapter 10: Bastion Hosts

Chapter 11: Unix and Linux Bastion Hosts

Chapter 12: Windows NT and Windows 2000 Bastion Hosts

Part III: Internet Services

Chapter 13: Internet Services and Firewalls

Chapter 14: Intermediary Protocols

Chapter 15: The World Wide Web

Chapter 16: Electronic Mail and News

Chapter 17: File Transfer, File Sharing, and Printing

Chapter 18: Remote Access to Hosts

Chapter 19: Real-Time Conferencing Services

Chapter 20: Naming and Directory Services

Chapter 21: Authentication and Auditing Services

Chapter 22: Administrative Services

Chapter 23: Databases and Games

Chapter 24: Two Sample Firewalls

Part IV: Keeping Your Site Secure

Chapter 25: Security Policies

Chapter 26: Maintaining Firewalls

Chapter 27: Responding to Security Incidents

Part V: Appendixes

Appendix A: Resources

Appendix B: Tools

Appendix C: Cryptography

Colophon

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Building Internet Firewalls 2e