Processing ......
Links to Free Computer, Mathematics, Technical Books all over the World
Building Internet Firewalls, 2nd Edition
How many flights will arrive to a particular airport? Click here to find out.
  • Title: Building Internet Firewalls, 2nd Edition
  • Author(s) Elizabeth D. Zwicky, Simon Cooper and D. Brent Chapman
  • Publisher: O'Reilly Media; Second Edition edition (January 15, 2000)
  • Hardcover/Paperback: 869 pages
  • eBook: HTML and PDF
  • Language: English
  • ISBN-10: 1565928717
  • ISBN-13: 978-1565928718
  • Share This:  

Book Description

This book is a part of The Networking CD Bookshelf, Version 2.0.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

  • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
  • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
  • Issues involved in a variety of new Internet services and protocols through a firewall
  • Email and News
  • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
  • File transfer and sharing services such as NFS, Samba
  • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
  • Real-time conferencing services such as ICQ and talk
  • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
  • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
  • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
  • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
  • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)
About the Authors
  • N/A
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
Book Categories
Other Categories
Resources and Links