Firewalls And Internet Security: Repelling The Wily Hacker

E-Book Overview

The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers.Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion.The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and descriptions of the tools and techniques used to perpetrate these attacks and to prevent them. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through an examination of problems and practices on today's intranets and discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions for the future of firewalls and Internet security. Appendices provide an introduction to cryptography and a list of resources readers can rely on to track further developments in Internet security. The book's Website will update these resources. Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make the security decisions that will make the Internet - and their computers - safer.

You might also like

Laboratory In Software Engineering (eecs 6170)
Authors: Daniel Jackson , Rob Miller    158    0


Network Analysis: Methodological Foundations
Authors: Ulrik Brandes , Thomas Erlebach (auth.) , Ulrik Brandes , Thomas Erlebach (eds.)    172    0


Scientific Visualization: The Visual Extraction Of Knowledge From Data
Authors: Georges-Pierre Bonneau , Thomas Ertl , Gregory M. Nielson    146    0



3d Structure From Images — Smile 2000: Second European Workshop On 3d Structure From Multiple Images Of Large-scale Environments Dublin, Irleand, July 1–2, 2000 Revised Papers
Authors: Paul Debevec (auth.) , Marc Pollefeys , Luc Van Gool , Andrew Zisserman , Andrew Fitzgibbon (eds.)    142    0


Programming In Haskell
Authors: Graham Hutton    156    0


Linear Programming And Its Applications
Authors: H.A. Eiselt , C.-L. Sandblom    123    0


Optimization Theory And Methods: Nonlinear Programming
Authors: Wenyu Sun , Ya-Xiang Yuan    180    0



Using Ssh
   140    0