Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Firewalls and Internet Security: Repelling the Wily Hacker
Top Free Algorithms Books 🌠 - 100% Free or Open Source!
  • Title: Firewalls and Internet Security: Repelling the Wily Hacker
  • Author(s) William R. Cheswick (Author), Steven M. Bellovin (Author)
  • Publisher: Addison-Wesley Professional (April 30, 1994); eBook (Online Edition)
  • License(s): For personal use only.
  • Paperback: 454 pages
  • eBook: PDF Files
  • Language: English
  • ISBN-10: 0785342634662
  • ISBN-13: 978-0201634662
  • Share This:  

Book Description

This book gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.

In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it.

In addition, there is vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security. With Firewalls and Internet Security, anyone will be well equipped to provide their organization with effective protection from the wily Internet hacker.

These authors are both well-known senior researchers at AT&T Bell Labs, and this book is based on their actual experiences maintaining, improving, and redesigning AT&T's Internet gateway. They show why the most popular technologies for keeping intruders out are insufficient, while providing a step-by-step guide to their solution--building firewall gateways.

About the Authors
  • William R. Cheswick (http://cheswick.com) is Chief Scientist at Lumeta Corporation, which explores and maps clients' network infrastructures and finds perimeter leaks.
  • Steven M. Bellovin (http://stevebellovin.com) is a Fellow at AT&T Labs Research, where he works on networks, security, and, especially, why the two don't get along.
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Palo Alto Firewall: Practical Guidance and Hands-On Labs

    This book explains step-by-step how to configure a Palo Alto firewall in the network. Each chapter begins with learning objectives and contains step-by-step explanations for GNS3 beginners on how to build different security scenarios from scratch.

  • FortiGate Firewall: Practical Guidance and Hands-On Labs

    This book explains step-by-step how to configure a FortiGate firewall in the network. Each chapter begins with learning objectives and contains step-by-step explanations for GNS3 beginners on how to build different security scenarios from scratch.

  • Firewalls Complete (Marcus Goncalves)

    This info-packed book covers virtually all firewall techniques, technologies, and brands - and even includes a blueprint for designing your own. It gives you 100% of what you need to deliver fully functional applications quickly.

  • Next-Generation Firewalls For Dummies (Palo Alto Networks)

    This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.

  • Building Internet Firewalls, 2nd Edition (E. Zwicky, et al)

    Without firewalls, network security problems can rage out of control. This book is is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

  • O'Reilly® Practical UNIX and Internet Security, Second Edition

    This book is a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection.

  • CompTIA Security+ Study Guide (Netwrix)

    This book is designed for IT and security professionals who aim to obtain CompTIA Security+ certification. It covers all the certification exam objectives (domains) of the latest version of the exam, Sy0-501.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

Book Categories
:
Other Categories
Resources and Links