• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar

OnlineProgrammingBooks.com

Legally Free Computer Books

  • All Categories
  • All Books
  • All Categories
  • All Books
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact
You are here: Home ▶ IT Security ▶ Firewalls and Internet Security

Firewalls and Internet Security

March 24, 2006

Firewalls and Internet Security

Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.

Book Description

This book is written primarily for the network administrator who must protect an organization from unhindered exposure to the Internet. The typical reader should have a background in system administration and networking. Some portions necessarily get intensely technical. A number of chapters are of more general interest. Readers with a casual interest can safely skip the tough stuff and still enjoy the rest of the book.

Table of Contents

  • Introduction
  • An Overview of TCP/IP
  • Firewall Gateways
  • How to Build an Application-Level Gateway
  • Authentication
  • Gateway Tools
  • Traps, Lures, and Honey Pots
  • The Hacker’s Workbench
  • Classes of Attacks
  • An Evening with Berferd
  • Where the Wild Things Are: A Look at the Logs
  • Legal Considerations
  • Secure Communications over Insecure Networks
  • Where Do We Go from Here?

Download Free PDF / Read Online

Author(s): William R. Cheswick and Steven M. Bellovin.
Publisher: Addison-Wesley Professional
Format(s): PDF
Number of pages: 464
Link: Download.

Similar Books:

  1. Open Source Security Tools
  2. Security+ Essentials
  3. Youth, Pornography, and the Internet
  4. Linux Administrator’s Security Guide
  5. Zen and the Art of the Internet
Previous Post: « Voice Communication Between Humans and Machines
Next Post: Beyond Linux From Scratch »

Primary Sidebar

Get Latest Updates

  • Facebook
  • Pinterest
  • RSS
  • Twitter
  • YouTube
  • About Us
  • Privacy policy
  • Disclaimer
  • Subscribe
  • Contact

Copyright © 2006–2023 OnlineProgrammingBooks.com