Building Internet Firewalls / Edition 2

Building Internet Firewalls / Edition 2

5.0 1
by Elizabeth Zwicky D., Simon Cooper, Brent Chapman D.
     
 

The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.See more details below

Overview

The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.

Product Details

ISBN-13:
9781565928718
Publisher:
O'Reilly Media, Incorporated
Publication date:
06/01/2000
Edition description:
Second Edition
Pages:
896
Product dimensions:
7.08(w) x 9.08(h) x 1.69(d)

Table of Contents

Preface

Part I: Network Security

Chapter 1: Why Internet Firewalls?

Chapter 2: Internet Services

Chapter 3: Security Strategies

Part II: Building Firewalls

Chapter 4: Packets and Protocols

Chapter 5: Firewall Technologies

Chapter 6: Firewall Architectures

Chapter 7: Firewall Design

Chapter 8: Packet Filtering

Chapter 9: Proxy Systems

Chapter 10: Bastion Hosts

Chapter 11: Unix and Linux Bastion Hosts

Chapter 12: Windows NT and Windows 2000 Bastion Hosts

Part III: Internet Services

Chapter 13: Internet Services and Firewalls

Chapter 14: Intermediary Protocols

Chapter 15: The World Wide Web

Chapter 16: Electronic Mail and News

Chapter 17: File Transfer, File Sharing, and Printing

Chapter 18: Remote Access to Hosts

Chapter 19: Real-Time Conferencing Services

Chapter 20: Naming and Directory Services

Chapter 21: Authentication and Auditing Services

Chapter 22: Administrative Services

Chapter 23: Databases and Games

Chapter 24: Two Sample Firewalls

Part IV: Keeping Your Site Secure

Chapter 25: Security Policies

Chapter 26: Maintaining Firewalls

Chapter 27: Responding to Security Incidents

Part V: Appendixes

Appendix A: Resources

Appendix B: Tools

Appendix C: Cryptography

Colophon

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >