Skip to content

Firewalls and Internet Security Repelling the Wily Hacker

Best in textbook rentals since 2012!

ISBN-10: 020163466X

ISBN-13: 9780201634662

Edition: 2nd 2003 (Revised)

Authors: John John Fuller, William Cheswick, Steven Bellovin, Aviel Rubin

List price: $59.99
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems students face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Students learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Written by well-known senior researchers at AT&T Bell Labs, Lumeta, and Johns Hopkins University the students will benefit from the…    
Customers also bought

Book details

List price: $59.99
Edition: 2nd
Copyright year: 2003
Publisher: Addison Wesley Professional
Publication date: 2/24/2003
Binding: Paperback
Pages: 464
Size: 7.25" wide x 9.00" long x 1.00" tall
Weight: 1.540
Language: English

AVIEL RUBIN, Ph.D., is a professor of computer science and technical director of the information security institute at Johns Hopkins University. His work has been covered by 60 Minutes, CNN, and NPR, and by The New York Times, The Washington Post, and other publications. He lives in Baltimore, Maryland.

Preface to the Second Edition
Preface to the First Edition
Getting Started
Introduction
Security Truisms
Picking a Security Policy
Host-Based Security
Perimeter Security
Strategies for a Secure Network
The Ethics of Computer Security
Warning
A Security Review of Protocols: Lower Layers
Basic Protocols
Managing Addresses and Names
IP Version 6
Network Address Translators
Wireless Security
Security Review: The Upper Layers
Messaging
Internet Telephony
RPC-Based Protocols
File Transfer Protocols
Remote Login
Simple Network Management Protocol-SNMP
The Network Time Protocol
Information Services
Proprietary protocols
Peer-to-Peer Networking
The X11 Window System
The Small Services
The Web: Threat or Menace?
The Web Protocols
Risks to the Clients
Risks to the Server
Web Servers vs. Firewalls
The Web and Databases
Parting Thoughts
The Threats
Classes of Attacks
Stealing Passwords
Social Engineering
Bugs and Backdoors
Authentication Failures
Protocol Failures
Information Leakage
Exponential Attacks-Viruses and Worms
Denial-of-Service Attacks
Botnets
Active Attacks
The Hacker's Workbench, and Other Munitions
Introduction
Hacking Goals
Scanning a Network
Breaking into the Host
The Battle for the Host
Covering Tracks
Metastasis
Hacking Tools
Tiger Teams
SAFER Tools and Services
Authentication
Remembering Passwords
Time-Based One-Time Passwords
Challenge/Response One-Time Passwords
Lamport's One-Time Password Algorithm
Smart Cards
Biometrics
Radius
SASL: An Authentication Framework
Host-to-Host Authentication
PKI. 8. Using Some Tools and Services
Inetd-Network Services
Ssh-Terminal and File Access
Syslog
Network Administration Tools
Chroot-Caging Suspect Software
Jailing the Apache Web Server
Aftpd-A Simple Anonymous FTP Daemon
Mail Transfer Agents
POP3 and Imap
Samba: An SMB Implementation
Taming Named
Adding SSL Support with sslwrap
Firewalls and VPNS
Kinds of Firewalls
Packet Filters
Application-Level Filtering
Circuit-Level Gateways
Dynamic Packet Filters
Distributed Firewalls
What Firewalls Cannot Do
Filtering Services
Reasonable Services to Filter
Digging for Worms
Services We Don't Like
Other Services
Something New
Firewall Engineering
Rulesets
Proxies
Building a Firewall from Scratch
Firewall Problems
Testing Firewalls
Tunneling and VPNs
Tunnels
Virtual Private Networks (VPNs)
Software vs. Hardware
Protecting an Organization
Network Layout
Intranet Explorations