
Firewalls and Internet Security
Repelling the Wily Hacker
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin
Résumé
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers.
Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion.
The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and descriptions of the tools and techniques used to perpetrate these attacks and to prevent them. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through an examination of problems and practices on today's intranets and discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions for the future of firewalls and Internet security.
Appendices provide an introduction to cryptography and a list of resources readers can rely on to track further developments in Internet security. The book's Web site will update these resources.
Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make the security decisions that will make the Internet--and their computers--safer.
Contents
Getting Started- Introduction
- A Security Review of Protocols: Lower Layers
- Security Review: The Upper Layers
- The Web: Threat or Menace?
- Classes of Attacks
- The Hacker's Workbench, and Other Munitions
- Authentication
- Using Some Tools and Services
- Kinds of Firewalls
- Filtering Services
- Firewall Engineering
- Tunneling and VPNs
- Network Layout
- Safe Hosts in a Hostile Environment
- Intrusion Detection
- An Evening with Berferd
- The Taking of Clark
- Secure Communications over Insecure Networks
- Where Do We Go from Here?
Bibliography
List of Bombs
List of Acronyms
L'auteur - William R. Cheswick
William R. Cheswick (http://cheswick.com) is Chief
Scientist at Lumeta Corporation, which explores and maps
clients' network infrastructures and finds perimeter leaks.
Formerly he was a senior researcher at Lucent Bell Labs,
where he did pioneering work in the areas of firewall
design and implementation, PC viruses, mailers, and
Internet munitions.
L'auteur - Steven M. Bellovin
Steven M. Bellovin (http://stevebellovin.com) is a
Fellow at AT&T Labs Research, where he works on
networks, security, and, especially, why the two don't get
along. He is a member of the National Academy of
Engineering and is one of the Security Area directors of
the Internet Engineering Task Force. Long ago he was one of
the creators of NetNews.
L'auteur - Aviel D. Rubin
Aviel D. Rubin (http://avirubin.com) is an Associate
Professor in the Computer Science Department at Johns
Hopkins University and serves as the Technical Director of
their Information Security Institute. He was previously
Principal Researcher in the Secure Systems Research
Department at AT&T Laboratories and is the author of
several books.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
Parution | 10/04/2003 |
Édition | 2eme édition |
Nb. de pages | 454 |
Format | 18,7 x 23,3 |
Couverture | Broché |
Poids | 698g |
Intérieur | Noir et Blanc |
EAN13 | 9780201634662 |
ISBN13 | 978-0-201-63466-2 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Firewalls
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet