Firewalls and Internet Security Repelling the Wily Hacker

ISBN-10: 020163466X
ISBN-13: 9780201634662
Edition: 2nd 2003 (Revised)
List price: $59.99 Buy it from $5.38
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems  More...

New Starting from $43.24
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Medical Terminology Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $59.99
Edition: 2nd
Copyright year: 2003
Publisher: Addison Wesley Professional
Publication date: 2/24/2003
Binding: Paperback
Pages: 464
Size: 7.25" wide x 9.00" long x 1.00" tall
Weight: 2.266
Language: English

The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems students face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Students learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Written by well-known senior researchers at AT&T Bell Labs, Lumeta, and Johns Hopkins University the students will benefit from the actual, real-world experiences of the authors maintaining, improving, and redesigning AT&T's Internet gateway.

Preface to the Second Edition
Preface to the First Edition
Getting Started
Introduction
Security Truisms
Picking a Security Policy
Host-Based Security
Perimeter Security
Strategies for a Secure Network
The Ethics of Computer Security
Warning
A Security Review of Protocols: Lower Layers
Basic Protocols
Managing Addresses and Names
IP Version 6
Network Address Translators
Wireless Security
Security Review: The Upper Layers
Messaging
Internet Telephony
RPC-Based Protocols
File Transfer Protocols
Remote Login
Simple Network Management Protocol-SNMP
The Network Time Protocol
Information Services
Proprietary protocols
Peer-to-Peer Networking
The X11 Window System
The Small Services
The Web: Threat or Menace?
The Web Protocols
Risks to the Clients
Risks to the Server
Web Servers vs. Firewalls
The Web and Databases
Parting Thoughts
The Threats
Classes of Attacks
Stealing Passwords
Social Engineering
Bugs and Backdoors
Authentication Failures
Protocol Failures
Information Leakage
Exponential Attacks-Viruses and Worms
Denial-of-Service Attacks
Botnets
Active Attacks
The Hacker's Workbench, and Other Munitions
Introduction
Hacking Goals
Scanning a Network
Breaking into the Host
The Battle for the Host
Covering Tracks
Metastasis
Hacking Tools
Tiger Teams
SAFER Tools and Services
Authentication
Remembering Passwords
Time-Based One-Time Passwords
Challenge/Response One-Time Passwords
Lamport's One-Time Password Algorithm
Smart Cards
Biometrics
Radius
SASL: An Authentication Framework
Host-to-Host Authentication
PKI. 8. Using Some Tools and Services
Inetd-Network Services
Ssh-Terminal and File Access
Syslog
Network Administration Tools
Chroot-Caging Suspect Software
Jailing the Apache Web Server
Aftpd-A Simple Anonymous FTP Daemon
Mail Transfer Agents
POP3 and Imap
Samba: An SMB Implementation
Taming Named
Adding SSL Support with sslwrap
Firewalls and VPNS
Kinds of Firewalls
Packet Filters
Application-Level Filtering
Circuit-Level Gateways
Dynamic Packet Filters
Distributed Firewalls
What Firewalls Cannot Do
Filtering Services
Reasonable Services to Filter
Digging for Worms
Services We Don't Like
Other Services
Something New
Firewall Engineering
Rulesets
Proxies
Building a Firewall from Scratch
Firewall Problems
Testing Firewalls
Tunneling and VPNs
Tunnels
Virtual Private Networks (VPNs)
Software vs. Hardware
Protecting an Organization
Network Layout
Intranet Explorations

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×