Limit search to available items
Book Cover
Author Zwicky, Elizabeth D.

Title Building Internet firewalls / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman
Edition Second edition
Published Beijing ; Cambridge [Mass.] ; Farnham [England] : O'Reilly, [2000]


Location Call no. Vol. Availability
 W'PONDS  005.8 Cha/Bif 2000  AVAILABLE
 MELB  005.8 Cha/Bif 2000  AVAILABLE
Description xix, 869 pages : illustrations ; 24 cm
Contents 1. Why Internet Firewalls? -- 2. Internet Services -- 3. Security Strategies -- 4. Packets and Protocols -- 5. Firewall Technologies -- 6. Firewall Architectures -- 7. Firewall Design -- 8. Packet Filtering -- 9. Proxy Systems -- 10. Bastion Hosts -- 11. Unix and Linux Bastion Hosts -- 12. Windows NT and Windows 2000 Bastion Hosts -- 13. Internet Services and Firewalls -- 14. Intermediary Protocols -- 15. The World Wide Web -- 16. Electronic Mail and News -- 17. File Transfer, File Sharing, and Printing -- 18. Remote Access to Hosts -- 19. Real-Time Conferencing Services -- 20. Naming and Directory Services -- 21. Authentication and Auditing Services -- 22. Administrative Services -- 23. Databases and Games -- 24. Two Sample Firewalls -- 25. Security Policies -- 26. Maintaining Firewalls -- 27. Responding to Security Incidents -- Appendix A. Resources -- Appendix B. Tools -- Appendix C. Cryptography
Summary In the five years since the first edition of this book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network - such as eavesdropping, a worm program, or file damage - from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall
Notes "Covers Unix, Windows NT, and Linux"--Cover
Chapman's name appears first on the earlier ed
Includes index
Bibliography Includes bibliographical references
Notes Available electronically by subscription
Subject Firewalls (Computer security)
Computer networks -- Security measures.
Internet -- Security measures.
Author Cooper, Simon.
Chapman, D. Brent.
LC no. 00039954
ISBN 1565928717
Other Titles Firewalls
Safari Technical Books