Firewalls and Internet Security
Home > Computing and Information Technology > Computer security > Data encryption > Firewalls and Internet Security: Repelling The Wily Hacker
Firewalls and Internet Security: Repelling The Wily Hacker

Firewalls and Internet Security: Repelling The Wily Hacker

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Written by two AT&T Bell Labs researchers who helped break the infamous "Berferd" hacker case, this book gives you invaluable advice and practical tools for protecting your organization's computers from the very real threat of a hacker attack through the Internet. The authors show you step-by-step how to set up a firewall gateway-a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.

Table of Contents:
Preface. I. GETTING STARTED. 1. Introduction. Why Security? Picking a Security Policy. Strategies for a Secure Network. The Ethics of Computer Security. WARNING. 2. An Overview of TCP/IP. The Different Layers. Routers and Routing Protocols. The Domain Name System. Standard Services. RPC. based Protocols. File Transfer Protocols. The “r” Commands. Information Services. The X11 System. Patterns of Trust. II. BUILDING YOUR OWN FIREWALL. 3. Firewall Gateways. Firewall Philosophy. Situating Firewalls. Packet-Filtering Gateways. Application-Level Gateways. Circuit-Level Gateways. Supporting Inbound Services. Tunnels Good and Bad. Joint Ventures. What Firewalls Can't Do. 4. How to Build an Application-Level Gateway. Policy. Hardware Configuration Options. Initial Installation. Gateway Tools. Installing Services. Protecting the Protectors. Gateway Administration. Safety Analysis (Why Our Setup Is Secure and Fail-Safe). Performance. The TIS Firewall Toolkit. Evaluating Firewalls. Living Without a Firewall. 5. Authentication. User Authentication. Host-to-Host Authentication. 6. Gateway Tools. Proxylib. Syslog. Watching the Network: Tcpdump and Friends. Adding Logging to Standard Daemons. 7. Traps, Lures, and Honey Pots. What to Log. Dummy Accounts. Tracing the Connection. 8. The Hacker's Workbench. Introduction. Discovery. Probing Hosts. Connection Tools. Routing Games. Network Monitors. Metastasis. Tiger Teams. Further Reading. III. A BOOK BACK. 9. Classes of Attacks. Stealing Passwords. Social Engineering. Bugs and Backdoors. Authentication Failures. Protocol Failures. Information Leakage. Denial-of-Service. 10. An Evening with Berferd. Introduction. Unfriendly Acts. An Evening with Berferd. The Day After. The Jail. Tracing Berferd. Berferd Comes Home. 11. Where the Wild Things Are: A Look at the Logs. A Year of Hacking. Proxy Use. Attack Sources. Noise on the Line. IV. ODDS AND ENDS. 12. Legal Considerations. Computer Crime Statutes. Log Files as Evidence. Is Monitoring Legal? Tort Liability Considerations. 13. Secure Communications over Insecure Networks. An Introduction to Cryptography. The Kerberos Authentication System. Link-Level Encryption. Network- and Transport-Level Encryption. Application-Level Encryption. 14. Where Do We Go from Here? Appendix A. Useful Free Stuff. Building Firewalls. Network Management and Monitoring Tools. Auditing Packages. Cryptographic Software. Information Sources. Appendix B. TCP and UDP Ports. Fixed Ports. MBone Usage. Appendix C. Recommendations to Vendors. Everyone. Hosts. Routers. Protocols. Firewalls. Bibliography. List of Bombs. Index. 0201633574T04062001


Best Sellers


Product Details
  • ISBN-13: 9780201633573
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison Wesley
  • Language: English
  • Spine Width: 20 mm
  • Weight: 543 gr
  • ISBN-10: 0201633574
  • Publisher Date: 21 Jun 1994
  • Binding: Paperback
  • No of Pages: 320
  • Sub Title: Repelling The Wily Hacker
  • Width: 235 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Firewalls and Internet Security: Repelling The Wily Hacker
Pearson Education (US) -
Firewalls and Internet Security: Repelling The Wily Hacker
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Firewalls and Internet Security: Repelling The Wily Hacker

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!