CARVIEW |


Building Internet Firewalls, Second Edition
Publisher: O'Reilly Media, Inc.
Pub. Date: June 26, 2000
Print ISBN-13: 978-1-56592-871-8
Pages in Print Edition: 896
Subscriber Rating:
[0 Ratings]
Overview

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
by William R. Cheswick; Steven M. Bellovin; Aviel D. Rubin

TCP/IP Network Administration, Third Edition
by Craig Hunt

Practical UNIX and Internet Security, Third Edition
by Simson Garfinkel; Gene Spafford; Alan Schwartz
Top Sellers in this Category

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by Dafydd Stuttard; Marcus Pinto

IPv6 Security
by Scott CCIE No. 5133 Hogg; Eric Vyncke

Inside Cyber Warfare
by Jeffrey Carr

Hacking: The Next Generation
by Nitesh Dhanjani; Billy Rios; Brett Hardin

Computer Forensics For Dummies®
by Linda Volonino; Reynaldo Anzaldua
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:
Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
Issues involved in a variety of new Internet services and protocols through a firewall
Email and News
Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
File transfer and sharing services such as NFS, Samba
Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
Real-time conferencing services such as ICQ and talk
Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)
Subscriber Reviews
Average Rating: Based on 0 Ratings
No Subscribers have provided a review for this book.
Browse Similar Topics
Top Level Categories:
Information Technology & Software Development
Sub-Categories:
Information Technology & Software Development > Networking
Networking > Firewalls
Some information on this page was provided using data from Amazon.com®. View at Amazon >
Extras
The publisher has provided additional content related to this title.
Description | Content |
---|---|
Visit the catalog page for Building Internet Firewalls, Second Edition | |
Visit the errata page for Building Internet Firewalls, Second Edition |
About Safari Books Online •
Terms of Service •
Gift Subscriptions •
Privacy Policy •
Contact Us •
Corporate Licenses •
Help •
Accessibility |
Copyright 2011Safari Books Online. All rights reserved.