\(
\def\WIPO{World Intellectual Property Organisation}
\)
Building Internet Firewalls : Internet and Web security.
2000
D 80 CHA.B(2)
Available at WIPO Library
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DataCite | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Title
Building Internet Firewalls : Internet and Web security.
Edition
Second edition.
Description
xxi, 869 pages : illustrations ; 24 cm.
ISBN
1565928717
9780596515669 electronic book
0596515669 electronic book
9781565928718
9780596551889 e-book
0596551886
9780596515669 electronic book
0596515669 electronic book
9781565928718
9780596551889 e-book
0596551886
Alternate Call Number
D 80 CHA.B(2)
Summary
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g....
Note
"Covers Unix, Windows NT, and Linux"--Cover.
Chapman's name appears first on the earlier ed.
La couv. porte en plus : "Internet and web security" et "2nd edition: covers Unix, Windows NT and Linux."
"Covers Unix, Windows NT, and Linux".
Chapman's name appears first on the earlier ed.
La couv. porte en plus : "Internet and web security" et "2nd edition: covers Unix, Windows NT and Linux."
"Covers Unix, Windows NT, and Linux".
Formatted Contents Note
Part I. Network security
1. Why Internet firewalls?
2. Internet services
3. Security strategies
Part II. Building firewalls
4. Packets and protocols
5. Firewall technologies
6. Firewall architectures
7. Firewall design
8. Packet filtering
9. Proxy systems
10. Bastion hosts
11. Unix and Linux Bastion hosts
12. Windows NT and Windows 2000 Bastion hosts
Part III. Internet services
13. Internet services and firewalls
14. Intermediary protocols
15. The World Wide Web
16. Electronic mail and news
17. File transfer, file sharing, and printing
18. Remote access to hosts
19. Real-time conferencing services
20. Naming and directory services
21. Authentication and auditing services
22. Administrative services
23. Databases and games
24. Two sample firewalls
Part IV. Keeping your site secure
25. Security policies
26. Maintaining firewalls
27. Responding to security incidents
Part V. Appendixes
A. Resources
B. Tools
C. Cryptography
Index.
1. Why Internet firewalls?
2. Internet services
3. Security strategies
Part II. Building firewalls
4. Packets and protocols
5. Firewall technologies
6. Firewall architectures
7. Firewall design
8. Packet filtering
9. Proxy systems
10. Bastion hosts
11. Unix and Linux Bastion hosts
12. Windows NT and Windows 2000 Bastion hosts
Part III. Internet services
13. Internet services and firewalls
14. Intermediary protocols
15. The World Wide Web
16. Electronic mail and news
17. File transfer, file sharing, and printing
18. Remote access to hosts
19. Real-time conferencing services
20. Naming and directory services
21. Authentication and auditing services
22. Administrative services
23. Databases and games
24. Two sample firewalls
Part IV. Keeping your site secure
25. Security policies
26. Maintaining firewalls
27. Responding to security incidents
Part V. Appendixes
A. Resources
B. Tools
C. Cryptography
Index.
Series
Series
Internet and web security.
Published
Beijing : O'Reilly, 2000.
Language
English
Record Appears in