Building Internet Firewalls: Internet and Web Security

3,69 valoración promedio
( 72 valoraciones por Goodreads )
 
9781565928718: Building Internet Firewalls: Internet and Web Security

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

    The book's complete list of resources includes the location of many publicly available firewall construction tools.

"Sinopsis" puede pertenecer a otra edición de este libro.

Review:

In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on the reasons that we build firewalls in the first place, which is to say the security risks that come with Internet connectivity. You'll learn a great deal about Internet services and the protocols that provide them as you follow this book's recommendations for stifling attacks.

If there's a shortcoming to this book, it's its lack of coverage of the turnkey firewall products that are becoming popular among home and small-office users. Emphasis here is on more complicated network defenses that require careful design and setup--both design and implementation are the order of the day here. The authors carefully enumerate the threats they see in various situations, go into some detail on how those threats manifest themselves, and explain what configuration changes you can make to your perimeter defenses to repulse those threats. Plenty of illustrations make points about good and bad security strategies (you want to put the routers here and here, not here or here). You'll learn a lot by reading this book from cover to cover, no matter how much experience you have. --David Wall

Topics covered: Means of protecting private networks from external security threats. The authors go into detail on attackers' means of exploiting security holes in common Internet services, and show how to plug those holes or at least limit the damage that can be done through them. With coverage of Unix, Linux, and Windows NT, the authors detail their philosophies of firewall design and general security policy.

From the Publisher:

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendices consisting of a resource summary, a directory of how to find firewall toolkits and other security-related tools, and a detailed summary providing TCP/IP background information.

"Sobre este título" puede pertenecer a otra edición de este libro.

Comprar nuevo Ver libro

Gastos de envío: EUR 6,33
De Estados Unidos de America a España

Destinos, gastos y plazos de envío

Añadir al carrito

Los mejores resultados en AbeBooks

1.

Zwicky, Elizabeth D.; Cooper, Simon; Chapman, D. Brent
Editorial: O'Reilly Media
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos PAPERBACK Cantidad: 1
Librería
Your Online Bookstore
(Houston, TX, Estados Unidos de America)
Valoración
[?]

Descripción O'Reilly Media. PAPERBACK. Estado de conservación: New. 1565928717 Ships promptly. Nº de ref. de la librería HGT6174KBGG030817H0896

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 14,18
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 6,33
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

2.

Simon Cooper, Elizabeth D. Zwicky and D. Brent Cha
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Cantidad: 1
Librería
Castle Rock
(Pittsford, NY, Estados Unidos de America)
Valoración
[?]

Descripción Estado de conservación: Brand New. Book Condition: Brand New. Nº de ref. de la librería 97815659287181.0

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 15,66
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 21,23
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

3.

Elizabeth D. Zwicky,Simon Cooper,D. Brent Chapman
Editorial: O'Reilly Media 2000-07-06 (2000)
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Paperback Cantidad: 3
Librería
Chiron Media
(Wallingford, Reino Unido)
Valoración
[?]

Descripción O'Reilly Media 2000-07-06, 2000. Paperback. Estado de conservación: New. Nº de ref. de la librería NU-GRD-02908239

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 35,71
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 3,27
De Reino Unido a España
Destinos, gastos y plazos de envío

4.

Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Editorial: O'Reilly Media 2000-07-13, Beijing |Cambridge, Mass. (2000)
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos paperback Cantidad: > 20
Librería
Blackwell's
(Oxford, OX, Reino Unido)
Valoración
[?]

Descripción O'Reilly Media 2000-07-13, Beijing |Cambridge, Mass., 2000. paperback. Estado de conservación: New. Nº de ref. de la librería 9781565928718

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 36,89
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 2,19
De Reino Unido a España
Destinos, gastos y plazos de envío

5.

Elizabeth D. Zwicky, D.Brent Chapman
Editorial: O Reilly Media, Inc, USA, United States (2000)
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Paperback Cantidad: 1
Librería
The Book Depository
(London, Reino Unido)
Valoración
[?]

Descripción O Reilly Media, Inc, USA, United States, 2000. Paperback. Estado de conservación: New. 2nd Revised edition. Language: English . Brand New Book. In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We ve updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today s computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: * Firewall technologies: packet filtering, proxying, network address translation, virtual private networks * Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls * Issues involved in a variety of new Internet services and protocols through a firewall * Email and News * Web services and scripting languages (e.g., Java, JavaScript, ActiveX, RealAudio, RealVideo) * File transfer and sharing services such as NFS, Samba * Remote access services such as Telnet, the BSD r commands, SSH, BackOrifice 2000 * Real-time conferencing services such as ICQ and talk * Naming and directory services (e.g., DNS, NetBT, the Windows Browser) * Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); * Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) * Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) * Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book s complete list of resources includes the location of many publicly available firewall construction tools. Nº de ref. de la librería AAH9781565928718

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 39,62
Convertir moneda

Añadir al carrito

Gastos de envío: GRATIS
De Reino Unido a España
Destinos, gastos y plazos de envío

6.

Elizabeth D. Zwicky, D.Brent Chapman
Editorial: O Reilly Media, Inc, USA, United States (2000)
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Paperback Cantidad: 1
Librería
The Book Depository US
(London, Reino Unido)
Valoración
[?]

Descripción O Reilly Media, Inc, USA, United States, 2000. Paperback. Estado de conservación: New. 2nd Revised edition. Language: English . Brand New Book. In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We ve updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today s computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: * Firewall technologies: packet filtering, proxying, network address translation, virtual private networks * Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls * Issues involved in a variety of new Internet services and protocols through a firewall * Email and News * Web services and scripting languages (e.g., Java, JavaScript, ActiveX, RealAudio, RealVideo) * File transfer and sharing services such as NFS, Samba * Remote access services such as Telnet, the BSD r commands, SSH, BackOrifice 2000 * Real-time conferencing services such as ICQ and talk * Naming and directory services (e.g., DNS, NetBT, the Windows Browser) * Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); * Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) * Intermediary protocols (e. g., RPC, SMB, CORBA, IIOP) * Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book s complete list of resources includes the location of many publicly available firewall construction tools. Nº de ref. de la librería AAH9781565928718

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 39,89
Convertir moneda

Añadir al carrito

Gastos de envío: GRATIS
De Reino Unido a España
Destinos, gastos y plazos de envío

7.

Zwicky, Elizabeth D.; Chapman, D.Brent
Editorial: O'Reilly Media, Inc, USA (2000)
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Tapa blanda Cantidad: 3
Librería
Valoración
[?]

Descripción O'Reilly Media, Inc, USA, 2000. Estado de conservación: New. This second edition of "Building Internet Firewalls" covers Unix, Linux, and Windows NT. It is a practical and detailed guide which provides step-by-step explanations of how to design and install firewalls, and how to configure Internet services to work with a firewall. Num Pages: 896 pages, black & white illustrations. BIC Classification: UDB; URD; URY. Category: (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 235 x 177 x 52. Weight in Grams: 1518. . 2000. Second Edition. Paperback. . . . . . Nº de ref. de la librería V9781565928718

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 41,50
Convertir moneda

Añadir al carrito

Gastos de envío: GRATIS
De Irlanda a España
Destinos, gastos y plazos de envío

8.

Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Editorial: O'Reilly Media (2000)
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Paperback Cantidad: 1
Librería
Ergodebooks
(RICHMOND, TX, Estados Unidos de America)
Valoración
[?]

Descripción O'Reilly Media, 2000. Paperback. Estado de conservación: New. Second Edition. Nº de ref. de la librería DADAX1565928717

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 29,93
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 11,89
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

9.

Elizabeth D. Zwicky, D.Brent Chapman, Simon Cooper
Editorial: O'Reilly Media, Inc, USA
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Paperback Cantidad: 5
Librería
THE SAINT BOOKSTORE
(Southport, Reino Unido)
Valoración
[?]

Descripción O'Reilly Media, Inc, USA. Paperback. Estado de conservación: new. BRAND NEW, Building Internet Firewalls (2nd Revised edition), Elizabeth D. Zwicky, D.Brent Chapman, Simon Cooper, In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: * Firewall technologies: packet filtering, proxying, network address translation, virtual private networks * Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls * Issues involved in a variety of new Internet services and protocols through a firewall * Email and News * Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) * File transfer and sharing services such as NFS, Samba * Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 * Real-time conferencing services such as ICQ and talk * Naming and directory services (e.g., DNS, NetBT, the Windows Browser) * Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); * Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) * Intermediary protocols (e. g., RPC, SMB, CORBA, IIOP) * Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools. Nº de ref. de la librería B9781565928718

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 35,48
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 7,62
De Reino Unido a España
Destinos, gastos y plazos de envío

10.

Zwicky, Elizabeth D.; Chapman, D.Brent
Editorial: O'Reilly Media, Inc, USA
ISBN 10: 1565928717 ISBN 13: 9781565928718
Nuevos Tapa blanda Cantidad: 3
Librería
Kennys Bookstore
(Olney, MD, Estados Unidos de America)
Valoración
[?]

Descripción O'Reilly Media, Inc, USA. Estado de conservación: New. This second edition of "Building Internet Firewalls" covers Unix, Linux, and Windows NT. It is a practical and detailed guide which provides step-by-step explanations of how to design and install firewalls, and how to configure Internet services to work with a firewall. Num Pages: 896 pages, black & white illustrations. BIC Classification: UDB; URD; URY. Category: (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 235 x 177 x 52. Weight in Grams: 1518. . 2000. Second Edition. Paperback. . . . . Books ship from the US and Ireland. Nº de ref. de la librería V9781565928718

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 44,14
Convertir moneda

Añadir al carrito

Gastos de envío: GRATIS
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Existen otras copia(s) de este libro

Ver todos los resultados de su búsqueda