undrgrnd Cliquez ici Baby ValentinB nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici Cliquez ici Acheter Fire Acheter Kindle Paperwhite cliquez_ici Jeux Vidéo Montres soldes Bijoux Soldes
Commencez à lire Building Internet Firewalls sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible
 

Building Internet Firewalls [Format Kindle]

Simon Cooper , Elizabeth D. Zwicky , D. Brent Chapman
3.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 40,62 De quoi s'agit-il ?
Prix livre imprimé : EUR 53,06
Prix Kindle : EUR 28,43 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 24,63 (46%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 28,43  
Broché EUR 53,12  
-40%, -50%, -60%, -70%... Découvrez les Soldes Amazon jusqu'au 16 février 2016 inclus. Profitez-en !





Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Présentation de l'éditeur

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

    The book's complete list of resources includes the location of many publicly available firewall construction tools.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 2927 KB
  • Nombre de pages de l'édition imprimée : 896 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : O'Reilly Media; Édition : 2 (26 juin 2000)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B0043EWUPM
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : 3.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

5 étoiles
0
4 étoiles
0
2 étoiles
0
1 étoiles
0
3.0 étoiles sur 5
3.0 étoiles sur 5
Meilleurs commentaires des clients
3.0 étoiles sur 5 Theoretical but not practical 30 mars 2013
Format:Broché
This book covers every aspect of TCP/IP networking security. You have some examples but most of the time it is very theoretical. If you are looking for a technical book, forget this one. If you are interested by history and explanations about networking security this is the one. This book is 850 pages.
Avez-vous trouvé ce commentaire utile ?
Signaler un abus
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.7 étoiles sur 5  31 commentaires
49 internautes sur 51 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 good book even for absolute beginner 6 juillet 2000
Par bookmark - Publié sur Amazon.com
Format:Broché
I have acquired a lot of web development tools e.g. ASP, JSP, javascript and so on, but I know nothing on how internet actually connects or how to secure a web page. Firewall has always come to my mind when i think about internet security, but I have no idea what it exactly is. Then, I find "Building Internet Firewalls" in a local bookstore one day.

O'Reilly books always gives me bad impression that they are hard to understand and won't teach you from the basics. However, this book changes my mind totally.

This book doesn't assume you have any experience on system Administration or knowledge on internet security. It starts out by explaining what firewall is. Then, it presents firewall technologies, architectures and design. After all the basics, it connects the concepts of firewall to Internet and how to configure it on UNIX and Window NT. In the last few chapters, it teaches how to maintain a firewall.

I can't tell whether this book is good for system administration or someone already has some knowledge on firewall before. but for me, as an absolute beginner, it makes me understands firewall and I am confident that I can make my own firewall.
29 internautes sur 29 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Informative Reference 24 août 2000
Par Todd Hawley - Publié sur Amazon.com
Format:Broché
This second edition goes into great detail on how to build and maintain a firewall. It briefly discusses the attacks earlier this year on various well-known web sites and notes that one effective way of (if not toally stopping) slowing down these types of attacks is by use of a firewall.
In the first section, it talks about the reasons for having a firewall and security strategies. The second section (Building Firewalls) consists of several chapters and describes topics like packet filtering, firewall architectures and design, proxy systems and bastion hosts. I gleaned a lot of good information from this section alone.
The next section contains chapters describeing how to protect against attackers invading any Internet services (World Wide Web, email & netnews, FTP, IRC, DNS, games, etc). The last section describes methods to keep your network secure, such as settinp up security policies, how to maintain your firewall once it's up and running, and how to deal with a "break-in." There's also three appendices containing various information about firewall tools, mailing lists and newsgroups.
All in all, an excellent book on building and maintaining a firewall.
31 internautes sur 32 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Firewalls and beyond; intrusion detectors will love it! 27 août 2000
Par Richard Bejtlich - Publié sur Amazon.com
Format:Broché
I am the officer technical lead for a 50-person military intrusion detection operation. I am also working with a team redesigning one service's enterprise-wide communication and security infrastructure, for whom firewalls are a key concern. "Building Internet Firewalls" will challenge your concept of how firewalls are created and operated. The authors do not limit their discussion to single box firewall solutions offered by most commercial vendors. Instead, they present alternative approaches and explain their strengths and weaknesses in an unbiased manner. Furthermore, the reader is treated to 330 pages (chapters 14-23) of the clearest, most concise guide to network protocols I've encountered. (I recommend Eric Hall's Internet Core Protocols and forthcoming Internet Application Protocols for greater detail.) From an intrusion detector's standpoint, this information on protocol features, ports, and characteristics is invaluable, and may solve a few mysteries. The author's attention to Windows as well as UNIX technologies is welcome, although most readers will share the author's frustration with certain Windows protocols. Thanks for the excellent work!
14 internautes sur 14 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The best firewall book available 20 avril 2001
Par Ben Rothke - Publié sur Amazon.com
Format:Broché
Every cell in the human body changes completely every seven years, but the underlying essence of the person remains. Similarly, information security has changed dramatically in the same time period, when the authors of this book were writing the first edition, but its essence has remained the same.
Topics such as ActiveX, RealVideo, IP version 6, and instant messaging were not even on the horizon when the first edition of this book was released. Now in its overdue second edition, the book covers these important topics and more.
Among the many fine security books available-several of which have been reviewed in this column-Building Internet Firewalls is one of the best. It is not just a comprehensive tome on firewalls; the authors take the many aspects of a firewall (for example, policies, protocols, and varied networks) and integrate them into a common framework. This is necessary, since management often equates security with firewalls.
Divided into four sections (network security, building firewalls, Internet services, and site security), the bulk of the book is built around the sections on Internet services and building firewalls. In these 20 chapters, the authors detail the many aspects of a firewall. Critical concepts such as firewall technologies, architectures, intermediary protocols, and directory services are discussed in detail. The authors do a splendid job of defining the various types of firewalls and exploring their advantages and weaknesses.
This book is remarkable for detailing the components of an effective information security system that are conferred via a firewall. Anyone needing a grasp on the often-confusing topic of firewalls need look no further.
This review originally appeared in the June issue of Security Management magazine
7 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The best. 12 mars 2002
Par Un client - Publié sur Amazon.com
Format:Broché
I build Firewall and Security Architectures for a living. In the last four years or so I have designed many architectures for major corporates worldwide. I consider this book as my standard reference work. Even after much practice I use this book occassionally still 'in the field'.
O'Reilly (Nutshell) books have always been quite superb. My TCP/IP and DNS references have been well worn over the years. As have my Perl nutshell.. etc...
Although Non Vendor specific this is actually a plus. To understand say Firewall-1 after assimilating this book will take you a 1/10 of the time it would take you from 'cold' - and your abilities will be 10 times as sharp. I say non-vendor specific as the books bias towards UNIX (and derivatives) expands to demonstrate several UNIX based free Firewall toolkits.
Really this book is a "practical" theory of Firewall systems. It covers an enormous amount of detail, and thus in some places may seem cursory. However in such circumstances the Internet can help you research these topics in more depth.
Many parts of this book actually described potential attacks that I was totally unfamiliar with (such as an unsolicited ECHO_REPLY ICMP padded with additional payload) - for this alone the book is worth its weight in gold.
However if I have criticisms, they are minor. The authors thinly disguised contempt of Windows (and praise of UNIX) on which to base a security architecture shows through occasionally (although to be fair, they are being realistic), and there are parts that demonstrate that the authors experience of "standard build" clients is limited.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique