Firewalls and Internet Security: Repelling the Wily HackerWritten by the people responsible for designing and maintaining AT&TUs Internet gateway, this is the definitive description and practical guide to protecting networks from hacker attacks. The book shows how to set up a "firewall" gateway--a dedicated computer equipped with safeguards that acts as a single, more easily defended Internet connection. |
From inside the book
Results 1-3 of 83
Page 15
... Encryption - Communications Security Encryption is often touted as the ultimate weapon in the computer security wars . It is not . It is certainly a valuable tool ( see Chapter 18 ) , but if encryption is used improperly , it can hurt ...
... Encryption - Communications Security Encryption is often touted as the ultimate weapon in the computer security wars . It is not . It is certainly a valuable tool ( see Chapter 18 ) , but if encryption is used improperly , it can hurt ...
Page 318
... Encryption Link - level encryption is the most transparent form of cryptographic protection . Indeed , it is of- ten implemented by outboard ... encrypted TCP hdr , 318 Secure Communications Link-Level Encryption Network-Level Encryption.
... Encryption Link - level encryption is the most transparent form of cryptographic protection . Indeed , it is of- ten implemented by outboard ... encrypted TCP hdr , 318 Secure Communications Link-Level Encryption Network-Level Encryption.
Page 342
... encryption or use of a longer key length is recommended if you think your enemy is well financed . Public Key ... encryption key , it is not feasible to discover the decryption key K - 1 . We write encryption as CEA [ P ] and decryption ...
... encryption or use of a longer key length is recommended if you think your enemy is well financed . Public Key ... encryption key , it is not feasible to discover the decryption key K - 1 . We write encryption as CEA [ P ] and decryption ...
Other editions - View all
Firewalls And Internet Security: Repelling The Wily Hacker, 2/E William R. Cheswick No preview available - 2003 |
Common terms and phrases
address space algorithm allow application attack Attempt to login authentication Bellovin Berferd block browser bytes CERT Advisory chroot Cited client command configuration connection cryptographic cryptosystems database denial-of-service denial-of-service attack drwxr-xr-x dynamic packet filter e-mail encryption Engineering Task Force example firewall FreeBSD gateway machine hackers hacking hardware ICMP implement incoming inetd inside installed interface internal Internet Engineering Task intranet IP address ipchains IPsec IPv6 jail Kerberos layer Linux one-time password operating system options outbound outgoing packet filter pass in quick password file POP3 port number problem protected protocol proxy public key queries relay root router routing rules ruleset scripts Section security holes sendmail server session SMTP smtpd someone system administrator TCP/IP telnet traffic trust tunnel UNIX Web server