tailieunhanh - Building Internet Firewalls

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. | Building Internet Firewalls Elizabeth D. Zwicky Simon Cooper D. Brent Chapman Second Edition June 2000 ISBN 1-56592-871-7 890 pages Completely revised and much expanded the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix Linux and Windows NT. This practical and detailed guide explains in step-by-step fashion how to design and install firewalls and configure Internet services to work with a firewall. It covers a wide range of services and protocols and offers a complete list of resources including the location of many publicly available firewalls construction tools. Release Team oR 2001 CONTENTS Preface 1 Scope of This Book Audience Platforms Products Examples Conventions Used in This Book Comments and Questions Acknowledgments for the Second Edition Acknowledgments for the First Edition I Network Security 8 1 Why Internet Fi rewalls What Are You Trying to Protect What Are You Trying to Protect Against Who Do You Trust How Can You Protect Your Site What Is an Internet Firewall Religious Arguments 9 2 Internet Services Secure Services and Safe Services The World Wide Web Electronic Mail and News File Transfer File Sharing and Printing Remote Access Real-Time Conferencing Services Naming and Directory Services Authentication and Auditing Services Administrative Services Databases Games 27 3 Security Strategies Least Privilege Defense in Depth Choke Point Weakest Link Fail-Safe Stance Universal Participation Diversity of Defense Simplicity Security Through Obscurity 42 II Building F irewalls 50 4 Packets and Protocols What Does a Packet Look Like IP Protocols Above IP Protocols Below IP Application Layer Protocols IP Version 6 Non-IP Protocols Attacks Based on Low-Level Protocol Details 51 5 Firewall Technologies Some Firewall Definitions Packet Filtering Proxy Services

TÀI LIỆU LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.