Firewalls and Internet security: repelling the wily hacker

Front Cover
Addison-Wesley, 1994 - Computers - 306 pages
4 Reviews
Getting started; why security?; picking a security policy; strategies for a secure network; the ethics of computer security; warning; an overview of TCP/IP; the different layers; routers and routing protocols; the domain name system; standard services; RPC-based protocols; file transfer protocols; the "r" commands; information services; the X11 system; patterns of trust; building your own firewall; firewall gateways; firewall philosophy; situating firewalls; packet-filtering gateways; applicatio-level gateways; circuit-level gateways; supporting inbound services; tunnels good and bad; joint ventures; what firewalls can't do; how to build and application-level gateway; policy; hardware configuration options; initial installation; gateway tools; installing services; protecting the protectors; gateway administration; safety analysis-why our setup is secure and fail-safe; performance; the TIS firewall toolkit; evaluating firewalls; living without a firewalls; authentication; user authentication; host-to-host authentication; gateway tools; proxylib; syslog; watching the network: tcpdump and friends; adding logging to standard daemons; traps, lures, and honey pots; what to log; dummy accounts; tracing the connection; the hacker's workbench; introduction; discovery; probing hosts; connection tools; routing games; network monitors; metastasis; tiger teams; further reading;; a look back; classes of attacks; stealing passwords; social engineering; bugs and backdoors; authentication failures; information leakage; denial-of-service; an evening with berferd; the day after; the jail; tracing berferd; berferd comes home; where the wild things are: a look at the logs; a year of hacking; proxy use; attack sources; noise on the line; odds and ends; legal considerations; computer crime statutes; log files as evidence; is monitoring legal?; tort liability considerations; secure communications over insecure networks; an introduction to cryptography; the kerberos authentication system; link-level encryption; network-and transport-level encryption; application-level encryption; where do we go from here?; useful free stuff; building firewalls; network management and monitoring tools; auditing packages; cryptographic software; information sources; TCP and UDP ports; fixed ports; mbone usage; recommendations to vendors; everyone; hosts; routers; protocols; firewalls; bibliography; index.

From inside the book

What people are saying - Write a review

LibraryThing Review

User Review  - BrentNewhall - LibraryThing

Highly technical book, naturally, that deals with setting up a secure computer or network. Clear and useful. Particularly interesting for the account of extended attacks on AT&T's system during the first Gulf War. Read full review

Review: Firewalls and Internet Security: Repelling the Wily Hacker

User Review  - Joe - Goodreads

This book is amazing or useless, depending on how you look at it. :-D If you need to simply "get it done" with a particular firewall, proxy etcetera, forget it. This book is useless. If, however, you ... Read full review

Related books


An Overview of TCPIP
Firewall Gateways

13 other sections not shown

Common terms and phrases

References to this book

All Book Search results »

References from web pages

Pearson - Firewalls and Internet Security: Repelling the Wily ...
Firewalls and Internet Security: Repelling the Wily Hacker, 2/E, William R. Cheswick Steven M. Bellovin Aviel D. Rubin, Johns Hopkins University ... educator/ academic/ product/ 1,3110,020163466X,00.html

"Firewalls and Internet Security", William R. Cheswick/Steven M ...
%T "Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition". As the first work to deal seriously and completely with the topic, ... reviews/ netsec/ firewalls-and-internet-security.htm

Free Books > Computers & Internet > Web Development > Security ...
Firewalls and Internet Security: Repelling the Wily Hacker. by William R. Cheswick And Steven M. Bellovin. Download Book ... books/ 83/ firewalls-and-internet-security-repelling-the-wily-hacker-36083.htm

Firewalls and Internet Security
Firewalls and Internet Security: Repelling the Wily Hacker, 2 edition. Firewalls and Internet Security. Purchase this Book · Purchase this Book ... citation.cfm?id=862335

Firewalls and Internet Security - The Internet Protocol Journal ...
Cheswick, W. and Bellovin, S., Firewalls and Internet Security: Repelling the Wily Hacker, ISBN 0201633574, Addison-Wesley, 1994. Ranum, M. and Avolio, F., ... warp/ public/ 759/ ipj_2-2/ ipj_2-2_fis1.html

Firewalls and internet security: Repelling the wily hacker. By ...
ADVANCED. MATERIALS. Book Reviews. Colloids, Connections, Chemistry, . . . The Colloidal Domain: Where Physics,. Chemistry, Biology, and Technology ... 10.1002/ adma.19960080319

Barnes & - Books: Firewalls and Internet Security, by ...
Firewalls and Internet Security: Repelling the Wily Hacker, Cheswick, William R. Cheswick, Paperback, Addison-Wesley Professional Computing Series, 2, Book, ... Firewalls-and-Internet-Security/ William-R-Cheswick/ e/ 9780201634662 : Firewalls and Internet Security, Second Edition ...
stock:. Brugge: niet op voorraad; Gent: niet op voorraad; Mechelen: niet op voorraad. Leuven: niet op voorraad; Schoten: niet op voorraad; Warehouse: niet ... p.aspx?p=F1533

Firewalls and Internet Security - Wikipedia, the free encyclopedia
First published in 1994, the book Firewalls and Internet Security: Repelling the Wily Hacker by William R. Cheswick and Steve Bellovin helped define the ... wiki/ Firewalls_and_Internet_Security

livre firewalls and internet security : repelling the wily hacker ...
livre securite : confidentialite, integrite disponibilite (firewall, proxy...). qualite. fiabilite : this completely updated and expanded second edition ... notice/ fr328350.html

Bibliographic information