Description |
xx, 433 pages : illustrations ; 24 cm |
Series |
Addison-Wesley professional computing series |
|
Addison-Wesley professional computing series.
|
Contents |
I. Getting Started -- 1. Introduction -- 2. A Security Review of Protocols: Lower Layers -- 3. Security Review: The Upper Layers -- 4. The Web: Threat or Menace? -- II. The Threats -- 5. Classes of Attacks -- 6. The Hacker's Workbench, and Other Munitions -- III. Safer Tools and Services -- 7. Authentication -- 8. Using Some Tools and Services -- IV. Firewalls and VPNs -- 9. Kinds of Firewalls -- 10. Filtering Services -- 11. Firewall Engineering -- 12. Tunneling and VPNs -- V. Protecting an Organization -- 13. Network Layout -- 14. Safe Hosts in a Hostile Environment -- 15. Instruction Detection -- VI. Lessons Learned -- 16. An Evening with Berferd -- 17. The Taking of Clark -- 18. Secure Communications over Insecure Networks -- 19. Where Do We Go from Here? -- VII. Appendixes -- A. An Introduction to Cryptography |
Summary |
Introduces the authors' philosophy of Internet security, explores possible attacks on hosts and networks, discusses firewalls and virtual private networks, and analyzes the state of communication security |
Bibliography |
Includes bibliographical references (pages 355-388) and index |
Subject |
Firewalls (Computer security)
|
|
Computer Security.
|
|
Computer Communication Networks.
|
Author |
Bellovin, Steven M.
|
|
Rubin, Aviel D.
|
LC no. |
2003000644 |
ISBN |
020163466X |
|