Building Internet Firewalls / Edition 2

Building Internet Firewalls / Edition 2

5.0 1
by Elizabeth Zwicky D., Simon Cooper, Brent Chapman D.
     
 

ISBN-10: 1565928717

ISBN-13: 9781565928718

Pub. Date: 06/01/2000

Publisher: O'Reilly Media, Incorporated

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks—and the need to protect both business and personal data—have

…  See more details below

Overview

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks—and the need to protect both business and personal data—have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network—such as eavesdropping, a worm program, or file damage—from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

    The book's complete list of resources includes the location of many publicly available firewall construction tools.

Read More

Product Details

ISBN-13:
9781565928718
Publisher:
O'Reilly Media, Incorporated
Publication date:
06/01/2000
Edition description:
Second Edition
Pages:
896
Product dimensions:
7.08(w) x 9.08(h) x 1.69(d)

Table of Contents

Preface

Part I: Network Security

Chapter 1: Why Internet Firewalls?

Chapter 2: Internet Services

Chapter 3: Security Strategies

Part II: Building Firewalls

Chapter 4: Packets and Protocols

Chapter 5: Firewall Technologies

Chapter 6: Firewall Architectures

Chapter 7: Firewall Design

Chapter 8: Packet Filtering

Chapter 9: Proxy Systems

Chapter 10: Bastion Hosts

Chapter 11: Unix and Linux Bastion Hosts

Chapter 12: Windows NT and Windows 2000 Bastion Hosts

Part III: Internet Services

Chapter 13: Internet Services and Firewalls

Chapter 14: Intermediary Protocols

Chapter 15: The World Wide Web

Chapter 16: Electronic Mail and News

Chapter 17: File Transfer, File Sharing, and Printing

Chapter 18: Remote Access to Hosts

Chapter 19: Real-Time Conferencing Services

Chapter 20: Naming and Directory Services

Chapter 21: Authentication and Auditing Services

Chapter 22: Administrative Services

Chapter 23: Databases and Games

Chapter 24: Two Sample Firewalls

Part IV: Keeping Your Site Secure

Chapter 25: Security Policies

Chapter 26: Maintaining Firewalls

Chapter 27: Responding to Security Incidents

Part V: Appendixes

Appendix A: Resources

Appendix B: Tools

Appendix C: Cryptography

Colophon

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Building Internet Firewalls 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
In this day and age, attacks by so-called 'hackers' against companies' internal networks are always a threat and virtually any business, government or educational institution needs to protect itself against this threat. Firewalls (while not 100% safe) offer an excellent protection against such attacks. These attacks as the books can come in many forms, such as 'denial of service' attacks. This updated second edition offers a lot of information about setting up and maintaining a firewall. It describes different types of firewalls, the tools (both software & hardware) you can use to set up your firewall, which Internet services (World Wide Web, electronic mail and netnews, FTP, telnet, teleconferencing, etc) you can decide to put through a firewall, and maintaining it once the firewall has been set up. There's a lot of good common-sense information in here too, when it talks about how you go about deciding what should and shouldn't be protected, who will have access to which services, what kind of security policies to set up, and what to do when you do have any type of 'break-in.' I learned quite a bit about firewalls from this book and anyone who needs to learn about firewalls should get a copy of this book if they already haven't.