Firewalls and Internet Security: Repelling the Wily HackerWritten by the people responsible for designing and maintaining AT&TUs Internet gateway, this is the definitive description and practical guide to protecting networks from hacker attacks. The book shows how to set up a "firewall" gateway--a dedicated computer equipped with safeguards that acts as a single, more easily defended Internet connection. |
Other editions - View all
Firewalls And Internet Security: Repelling The Wily Hacker, 2/E William R. Cheswick No preview available - 2003 |
Common terms and phrases
address space algorithm allow application attack Attempt to login authentication Bellovin Berferd block browser bytes CERT Advisory chroot Cited client command configuration connection cryptographic cryptosystems database denial-of-service denial-of-service attack drwxr-xr-x dynamic packet filter e-mail encryption Engineering Task Force example firewall FreeBSD gateway machine hackers hacking hardware ICMP implement incoming inetd inside installed interface internal Internet Engineering Task intranet IP address ipchains IPsec IPv6 jail Kerberos layer Linux one-time password operating system options outbound outgoing packet filter pass in quick password file POP3 port number problem protected protocol proxy public key queries relay root router routing rules ruleset scripts Section security holes sendmail server session SMTP smtpd someone system administrator TCP/IP telnet traffic trust tunnel UNIX Web server