Building Internet Firewalls

Internet and Web Security

Nonfiction, Computers, Internet, Security, General Computing
Cover of the book Building Internet Firewalls by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman ISBN: 9780596551889
Publisher: O'Reilly Media Publication: June 26, 2000
Imprint: O'Reilly Media Language: English
Author: Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
ISBN: 9780596551889
Publisher: O'Reilly Media
Publication: June 26, 2000
Imprint: O'Reilly Media
Language: English

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

  • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks

    Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls

    Issues involved in a variety of new Internet services and protocols through a firewall

    Email and News

    Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)

    File transfer and sharing services such as NFS, Samba

    Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000

    Real-time conferencing services such as ICQ and talk

    Naming and directory services (e.g., DNS, NetBT, the Windows Browser)

    Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);

    Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)

    Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)

    Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

  • The book's complete list of resources includes the location of many publicly available firewall construction tools.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

More books from O'Reilly Media

Cover of the book Essential System Administration by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Essential ActionScript 3.0 by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Fixing Access Annoyances by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Intelligence-Driven Incident Response by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book User Story Mapping by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Programming Amazon EC2 by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Security Warrior by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book C# 6.0 Cookbook by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Squid: The Definitive Guide by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Head First Learn to Code by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Efficient R Programming by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Flash CS5.5: The Missing Manual by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Extreme Programming Pocket Guide by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Perl Best Practices by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
Cover of the book Android Developer Tools Essentials by Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy