Skip to content

Firewalls and Internet Security Repelling the Wily Hacker

Best in textbook rentals since 2012!

ISBN-10: 0201633574

ISBN-13: 9780201633573

Edition: 1st 1994

Authors: William R. Cheswick, Steven M. Bellovin

List price: $36.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Written by two AT&T Bell Labs researchers who helped break the infamous "Berferd" hacker case, this book gives you invaluable advice and practical tools for protecting your organization's computers from the very real threat of a hacker attack through the Internet. The authors show you step-by-step how to set up a firewall gateway-a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.
Customers also bought

Book details

List price: $36.95
Edition: 1st
Copyright year: 1994
Publisher: Addison Wesley Professional
Publication date: 4/30/1994
Binding: Paperback
Pages: 320
Size: 7.40" wide x 9.25" long x 0.79" tall
Weight: 1.188
Language: English

Preface
Getting Started
Introduction
Why Security?
Picking a Security Policy
Strategies for a Secure Network
The Ethics of Computer Security
Warning
An Overview of TCP/IP
The Different Layers
Routers and Routing Protocols
The Domain Name System
Standard Services
RPC
Based Protocols
File Transfer Protocols
The r Commands
Information Services
The X11 System
Patterns of Trust
Building Your Own Firewall
Firewall Gateways
Firewall Philosophy
Situating Firewalls
Packet-Filtering Gateways
Application-Level Gateways
Circuit-Level Gateways
Supporting Inbound Services
Tunnels Good and Bad
Joint Ventures
What Firewalls Can't Do
How to Build an Application-Level Gateway
Policy
Hardware Configuration Options
Initial Installation
Gateway Tools
Installing Services
Protecting the Protectors
Gateway Administration
Safety Analysis (Why Our Setup Is Secure and Fail-Safe)
Performance
The TIS Firewall Toolkit
Evaluating Firewalls
Living Without a Firewall
Authentication
User Authentication
Host-to-Host Authentication
Gateway Tools
Proxylib
Syslog
Watching the Network: Tcpdump and Friends
Adding Logging to Standard Daemons
Traps, Lures, and Honey Pots
What to Log
Dummy Accounts
Tracing the Connection
The Hacker's Workbench
Introduction
Discovery
Probing Hosts
Connection Tools
Routing Games
Network Monitors
Metastasis
Tiger Teams
Further Reading
A Book Back
Classes of Attacks
Stealing Passwords
Social Engineering
Bugs and Backdoors
Authentication Failures
Protocol Failures
Information Leakage
Denial-of-Service
An Evening with Berferd
Introduction
Unfriendly Acts
An Evening with Berferd
The Day After
The Jail
Tracing Berferd
Berferd Comes Home
Where the Wild Things Are: A Look at the Logs
A Year of Hacking
Proxy Use
Attack Sources
Noise on the Line
Odds And Ends
Legal Considerations
Computer Crime Statutes
Log Files as Evidence
Is Monitoring Legal?
Tort Liability Considerations
Secure Communications over Insecure Networks
An Introduction to Cryptography
The Kerberos Authentication System
Link-Level Encryption
Network- and Transport-Level Encryption
Application-Level Encryption
Where Do We Go from Here?
Useful Free Stuff
Building Firewalls
Network Management and Monitoring Tools
Auditing Packages
Cryptographic Software
Information Sources
TCP and UDP Ports
Fixed Ports
MBone Usage
Recommendations to Vendors
Everyone
Hosts
Routers
Protocols
Firewalls
Bibliography
List of Bombs
Index