Firewalls and Internet security: repelling the wily hacker

Front Cover
Addison-Wesley, 1994 - Computers - 306 pages
4 Reviews
Getting started; why security?; picking a security policy; strategies for a secure network; the ethics of computer security; warning; an overview of TCP/IP; the different layers; routers and routing protocols; the domain name system; standard services; RPC-based protocols; file transfer protocols; the "r" commands; information services; the X11 system; patterns of trust; building your own firewall; firewall gateways; firewall philosophy; situating firewalls; packet-filtering gateways; applicatio-level gateways; circuit-level gateways; supporting inbound services; tunnels good and bad; joint ventures; what firewalls can't do; how to build and application-level gateway; policy; hardware configuration options; initial installation; gateway tools; installing services; protecting the protectors; gateway administration; safety analysis-why our setup is secure and fail-safe; performance; the TIS firewall toolkit; evaluating firewalls; living without a firewalls; authentication; user authentication; host-to-host authentication; gateway tools; proxylib; syslog; watching the network: tcpdump and friends; adding logging to standard daemons; traps, lures, and honey pots; what to log; dummy accounts; tracing the connection; the hacker's workbench; introduction; discovery; probing hosts; connection tools; routing games; network monitors; metastasis; tiger teams; further reading;; a look back; classes of attacks; stealing passwords; social engineering; bugs and backdoors; authentication failures; information leakage; denial-of-service; an evening with berferd; the day after; the jail; tracing berferd; berferd comes home; where the wild things are: a look at the logs; a year of hacking; proxy use; attack sources; noise on the line; odds and ends; legal considerations; computer crime statutes; log files as evidence; is monitoring legal?; tort liability considerations; secure communications over insecure networks; an introduction to cryptography; the kerberos authentication system; link-level encryption; network-and transport-level encryption; application-level encryption; where do we go from here?; useful free stuff; building firewalls; network management and monitoring tools; auditing packages; cryptographic software; information sources; TCP and UDP ports; fixed ports; mbone usage; recommendations to vendors; everyone; hosts; routers; protocols; firewalls; bibliography; index.

From inside the book

What people are saying - Write a review

LibraryThing Review

User Review  - BrentNewhall - LibraryThing

Highly technical book, naturally, that deals with setting up a secure computer or network. Clear and useful. Particularly interesting for the account of extended attacks on AT&T's system during the first Gulf War. Read full review

Review: Firewalls and Internet Security: Repelling the Wily Hacker

User Review  - Joe - Goodreads

This book is amazing or useless, depending on how you look at it. :-D If you need to simply "get it done" with a particular firewall, proxy etcetera, forget it. This book is useless. If, however, you ... Read full review

Related books

Contents

Introduction
3
An Overview of TCPIP
19
Firewall Gateways
51
Copyright

13 other sections not shown

Common terms and phrases

References to this book

All Book Search results »

References from web pages

Pearson - Firewalls and Internet Security: Repelling the Wily ...
Firewalls and Internet Security: Repelling the Wily Hacker, 2/E, William R. Cheswick Steven M. Bellovin Aviel D. Rubin, Johns Hopkins University ...
www.pearsonhighered.com/ educator/ academic/ product/ 1,3110,020163466X,00.html

"Firewalls and Internet Security", William R. Cheswick/Steven M ...
%T "Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition". As the first work to deal seriously and completely with the topic, ...
www.iwar.org.uk/ reviews/ netsec/ firewalls-and-internet-security.htm

Free Books > Computers & Internet > Web Development > Security ...
Firewalls and Internet Security: Repelling the Wily Hacker. by William R. Cheswick And Steven M. Bellovin. Download Book ...
2020ok.com/ books/ 83/ firewalls-and-internet-security-repelling-the-wily-hacker-36083.htm

Firewalls and Internet Security
Firewalls and Internet Security: Repelling the Wily Hacker, 2 edition. Firewalls and Internet Security. Purchase this Book · Purchase this Book ...
portal.acm.org/ citation.cfm?id=862335

Firewalls and Internet Security - The Internet Protocol Journal ...
Cheswick, W. and Bellovin, S., Firewalls and Internet Security: Repelling the Wily Hacker, ISBN 0201633574, Addison-Wesley, 1994. Ranum, M. and Avolio, F., ...
www.cisco.com/ warp/ public/ 759/ ipj_2-2/ ipj_2-2_fis1.html

Firewalls and internet security: Repelling the wily hacker. By ...
ADVANCED. MATERIALS. Book Reviews. Colloids, Connections, Chemistry, . . . The Colloidal Domain: Where Physics,. Chemistry, Biology, and Technology ...
doi.wiley.com/ 10.1002/ adma.19960080319

Barnes & Noble.com - Books: Firewalls and Internet Security, by ...
Firewalls and Internet Security: Repelling the Wily Hacker, Cheswick, William R. Cheswick, Paperback, Addison-Wesley Professional Computing Series, 2, Book, ...
search.barnesandnoble.com/ Firewalls-and-Internet-Security/ William-R-Cheswick/ e/ 9780201634662

www.HCW.be : Firewalls and Internet Security, Second Edition ...
stock:. Brugge: niet op voorraad; Gent: niet op voorraad; Mechelen: niet op voorraad. Leuven: niet op voorraad; Schoten: niet op voorraad; Warehouse: niet ...
www.computerwinkeltje.be/ p.aspx?p=F1533

Firewalls and Internet Security - Wikipedia, the free encyclopedia
First published in 1994, the book Firewalls and Internet Security: Repelling the Wily Hacker by William R. Cheswick and Steve Bellovin helped define the ...
en.wikipedia.org/ wiki/ Firewalls_and_Internet_Security

livre firewalls and internet security : repelling the wily hacker ...
livre securite : confidentialite, integrite disponibilite (firewall, proxy...). qualite. fiabilite : this completely updated and expanded second edition ...
www.lavoisier.fr/ notice/ fr328350.html

Bibliographic information