Building Internet Firewalls: Internet and Web Security

Building Internet Firewalls: Internet and Web Security
ISBN-10
0596551886
ISBN-13
9780596551889
Category
Computers
Pages
896
Language
English
Published
2000-06-26
Publisher
"O'Reilly Media, Inc."
Authors
Simon Cooper, Elizabeth D. Zwicky, D. Brent Chapman

Description

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.

Other editions

Similar books

  • Building Internet Firewalls
    By Simon Cooper, D. Brent Chapman

    In the five years since the first edition of this classic book was published, Internet use has exploded.

  • Firewalls For Dummies
    By Brian Komar, Ronald Beekelaar, Joern Wettern

    Firewalls For Dummies® helps you understand what firewalls are, how they operate on different types of networks, what they can and can’t do, and how to pick a good one (it’s easier than identifying that perfect melon in the supermarket ...

  • Firewalls and Internet Security: Repelling the Wily Hacker
    By William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin

    Steven M. Bellovin ( http://stevebellovin.com ) is a Fellow at AT & T Labs Research , where he works on networks , security , and ... ISBN 0-201-63466 - X $ 49.99 US $ 77.99 CANADA A Addison - Wesley Pearson Education 7 85342 " 63466 " 2.

  • Building Linux and OpenBSD Firewalls
    By Wes Sonnenreich, Tom Yates

    A step-by-step guide to bulding a commercial-grade firewall with open source software Building Linux and OpenBSD Firewalls It's now more important than ever before to protect your data...

  • The Best Damn Firewall Book Period
    By Thomas W Shinder

    For example, the Ping of Death attack targets ICMP (ping), and if it reaches a vulnerable host, it will crash, causing a DOS. Though other protocols exist within this layer (ARP, RARP, RIP, OSPF), SmartDefense only provides protections ...

  • Firewalls: Jumpstart for Network and Systems Administrators
    By John R. Vacca, Scott Ellis

    In this book, you will gain extensive hands-on experience installing and configuring a firewall.

  • Building DMZs For Enterprise Networks
    By Syngress

    - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.

  • Zero Trust Networks: Building Secure Systems in Untrusted Networks
    By Evan Gilman, Doug Barth

    The cover image is from Pictorial Museum of Animated Nature. The cover fonts are URW Typewriter and Guardian Sans. The text font is Adobe Minion Pro; the heading font is Adobe Myriad Condensed; and the code font is Dalton Maag's ...

  • Network Security, Firewalls and VPNs
    By J. Michael Stewart

    Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.

  • Linux Networking Cookbook: From Asterisk to Zebra with Easy-to-Use Recipes
    By Carla Schroder

    If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for ...