William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin9780201634662, 020163466X
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems companies face in today’s Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers.Firewalls and Internet Security, Second Edition, draws upon the authors’ experiences as researchers in the forefront of their field since the beginning of the Internet explosion.The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and descriptions of the tools and techniques used to perpetrate these attacks and to prevent them. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through an examination of problems and practices on today’s intranets and discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions for the future of firewalls and Internet security. Appendices provide an introduction to cryptography and a list of resources readers can rely on to track further developments in Internet security. The book’s Website will update these resources. Armed with the authors’ hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make the security decisions that will make the Internet – and their computers – safer. |
Table of contents : Contents……Page 8 Part I Getting Started……Page 22 01 Introduction……Page 24 02 Security Review of Protocols:……Page 40 03 Security Review: Upper Layers……Page 62 04 The Web: Threat or Menance?……Page 94 Part II The Threats……Page 114 05 Classes of Attacks……Page 116 06 Hacker’s Workbench………Page 140 Part III Safer Tools & Service……Page 156 07 Authentication……Page 158 08 Using Some Tools & Services……Page 174 Part IV Firewalls & VPNs……Page 194 09 Kinds of Firewalls……Page 196 10 Filtering Services……Page 218 11 Firewall Engineering……Page 232 12 Tunneling & VPNs……Page 254 Part V Protecting an Organization……Page 266 13 Network Layout……Page 268 14 Safe Hosts in a Hostile Environment……Page 280 15 Intrusion Detection……Page 300 Part VI Lessons Learned……Page 306 16 An Evening with Berferd……Page 308 17 The Taking of Clark……Page 322 18 Secure Communications……Page 334 19 Where Do We Go from Here?……Page 350 Part VII Appendixes……Page 354 A: An Intro to Cryptography……Page 356 B: Keeping Up……Page 370 Bibliography……Page 376 List of •bombs•……Page 410 List of Acronyms……Page 412 Index……Page 418 |
Reviews
There are no reviews yet.