In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.
What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.
Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:
The book's complete list of resources includes the location of many publicly available firewall construction tools.
"synopsis" may belong to another edition of this title.
If there's a shortcoming to this book, it's its lack of coverage of the turnkey firewall products that are becoming popular among home and small-office users. Emphasis here is on more complicated network defenses that require careful design and setup--both design and implementation are the order of the day here. The authors carefully enumerate the threats they see in various situations, go into some detail on how those threats manifest themselves, and explain what configuration changes you can make to your perimeter defenses to repulse those threats. Plenty of illustrations make points about good and bad security strategies (you want to put the routers here and here, not here or here). You'll learn a lot by reading this book from cover to cover, no matter how much experience you have. --David Wall
Topics covered: Means of protecting private networks from external security threats. The authors go into detail on attackers' means of exploiting security holes in common Internet services, and show how to plug those holes or at least limit the damage that can be done through them. With coverage of Unix, Linux, and Windows NT, the authors detail their philosophies of firewall design and general security policy.
"About this title" may belong to another edition of this title.
Shipping:
US$ 4.00
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_1565928717
Book Description Condition: new. Seller Inventory # newMercantile_1565928717
Book Description Paperback. Condition: new. Buy for Great customer experience. Seller Inventory # GoldenDragon1565928717
Book Description Paperback. Condition: new. Brand New Copy. Seller Inventory # BBB_new1565928717
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard1565928717
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think1565928717
Book Description Condition: new. Seller Inventory # FrontCover1565928717
Book Description Soft Cover. Condition: new. Seller Inventory # 9781565928718
Book Description Condition: New. Seller Inventory # 529529-n
Book Description Condition: New. Buy with confidence! Book is in new, never-used condition 3.1. Seller Inventory # bk1565928717xvz189zvxnew