Firewalls and Internet Security: Repelling the Wily Hacker

Front Cover
Addison-Wesley Professional, 2003 - Computers - 433 pages
9 Reviews

•This book is the bible of Internet security. Whatever else is in the market, this one is at the very top of the list. Notable for its engaging style, technical depth, and the clear real-world experiences of the authors.
•Nearly a complete rewrite of the first edition; reviewers say it's even better.
•First edition has sold more than 68,000 copies! (1/e was Y; 2/e is X.)
  

What people are saying - Write a review

User ratings

5 stars
5
4 stars
3
3 stars
1
2 stars
0
1 star
0

LibraryThing Review

User Review  - BrentNewhall - LibraryThing

Highly technical book, naturally, that deals with setting up a secure computer or network. Clear and useful. Particularly interesting for the account of extended attacks on AT&T's system during the first Gulf War. Read full review

Contents

IV
3
V
7
VI
10
VIII
11
IX
16
X
18
XI
19
XIII
28
XCI
197
XCII
198
XCIII
206
XCIV
207
XCV
209
XCVI
210
XCVII
211
XCVIII
212

XIV
34
XV
37
XVI
38
XVII
41
XIX
46
XX
47
XXI
52
XXII
58
XXIII
62
XXIV
63
XXV
64
XXVI
68
XXVII
69
XXVIII
70
XXIX
71
XXX
73
XXXI
74
XXXII
79
XXXIII
85
XXXIV
89
XXXV
91
XXXVII
93
XXXVIII
95
XL
98
XLI
100
XLII
103
XLIII
104
XLIV
105
XLV
106
XLVI
107
XLVII
117
XLIX
119
LI
121
LIII
122
LIV
123
LV
126
LVI
127
LVII
128
LVIII
132
LIX
135
LX
137
LXI
138
LXII
144
LXIII
145
LXIV
146
LXV
147
LXVII
148
LXVIII
149
LXX
150
LXXI
153
LXXII
154
LXXIII
158
LXXIV
159
LXXV
162
LXXVI
165
LXXVII
167
LXXVIII
168
LXXX
169
LXXXI
170
LXXXIII
173
LXXXIV
175
LXXXV
176
LXXXVI
185
LXXXVII
186
LXXXVIII
188
LXXXIX
193
XC
194
XCIX
214
C
215
CI
227
CII
230
CIII
233
CIV
234
CV
236
CVI
242
CVII
245
CVIII
247
CIX
248
CX
249
CXI
253
CXII
255
CXIII
257
CXIV
259
CXV
260
CXVI
265
CXVII
266
CXVIII
270
CXIX
271
CXX
277
CXXI
279
CXXII
280
CXXIII
281
CXXIV
282
CXXVI
285
CXXVII
287
CXXVIII
290
CXXIX
294
CXXX
295
CXXXI
296
CXXXII
298
CXXXIII
301
CXXXIV
302
CXXXVI
303
CXXXVII
304
CXXXVIII
310
CXL
311
CXLI
312
CXLII
313
CXLIII
314
CXLIV
318
CXLVI
322
CXLVII
329
CXLVIII
330
CL
331
CLII
332
CLIII
333
CLIV
335
CLV
337
CLVI
339
CLVII
342
CLVIII
343
CLIX
344
CLX
346
CLXI
347
CLXII
349
CLXIII
350
CLXIV
351
CLXV
352
CLXVII
353
CLXVIII
355
CLXIX
389
CLXX
391
CLXXI
397
Copyright

Common terms and phrases

About the author (2003)

William R. Cheswick (http://cheswick.com) is Chief Scientist at Lumeta Corporation, which explores and maps clients' network infrastructures and finds perimeter leaks. Formerly he was a senior researcher at Lucent Bell Labs, where he did pioneering work in the areas of firewall design and implementation, PC viruses, mailers, and Internet munitions.

Steven M. Bellovin (http://stevebellovin.com) is a Fellow at AT&T Labs Research, where he works on networks, security, and, especially, why the two don't get along. He is a member of the National Academy of Engineering and is one of the Security Area directors of the Internet Engineering Task Force. Long ago he was one of the creators of NetNews.

Aviel D. Rubin (http://avirubin.com) is an Associate Professor in the Computer Science Department at Johns Hopkins University and serves as the Technical Director of their Information Security Institute. He was previously Principal Researcher in the Secure Systems Research Department at AT&T Laboratories and is the author of several books.



020163466XAB01302003

Bibliographic information