1. Introduction -- 2. An Overview of TCP/IP -- 3. Firewall Gateways -- 4. How to Build an Application-Level Gateway -- 5. Authentication -- 6. Gateway Tools -- 7. Traps, Lures, and Honey Pots -- 8. The Hacker's Workbench -- 9. Classes of Attacks -- 10. An Evening with Berferd -- 11. Where the Wild Things Are: A Look at the Logs -- 12. Legal Considerations --13. Secure Communications over Insecure Networks --14. Where Do We Go from Here? -- A Useful Free Stuff --B TCP and UDP Ports -- C Recommendations to Vendors
Notes
Includes index
Bibliography
Includes bibliographical references (pages 257-276) and index