Commencez à lire Linux Firewalls: Attack Detection and Response sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible
 

Linux Firewalls: Attack Detection and Response [Format Kindle]

Michael Rash
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 37,51 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 47,12
Prix Kindle : EUR 26,26 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 20,86 (44%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 26,26  
Broché EUR 46,67  
Promotion Kindle de l'été : plus de 120 ebooks à -50% ou plus
PROMOTION KINDLE DE L’ÉTÉ
Retrouvez plus de 120 ebooks à -50% ou plus dans notre promotion Kindle de l'été.
-40%, -50%, -60%, -70%... Découvrez les Soldes Amazon jusqu'au 4 août 2015 inclus. Profitez-en !





Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Présentation de l'éditeur

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

  • Book Description

    Linux firewalls provide capabilities that rival commercial firewalls, and are built upon the powerful Netfilter infrastructure in the Linux kernel. Linux Firewalls: Attack Detection and Response explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rulesets and custom open source software created by the author. Providing concrete examples to illustrate concepts, the book discusses Linux firewall log analysis and policies, passive network authentication and authorization, exploit packet traces and Snort ruleset emulation, and more. Perl and C code snippets are included to help readers maximize the deployment of Linux firewalls as effective mechanisms for the detection and prevention of various network-based attacks.

    Détails sur le produit

    • Format : Format Kindle
    • Taille du fichier : 1235 KB
    • Nombre de pages de l'édition imprimée : 336 pages
    • Utilisation simultanée de l'appareil : Illimité
    • Editeur : No Starch Press; Édition : 1 (24 septembre 2007)
    • Vendu par : Amazon Media EU S.à r.l.
    • Langue : Anglais
    • ASIN: B002N3M6S6
    • Synthèse vocale : Activée
    • X-Ray :
    • Word Wise: Non activé
    • : Non activé
    • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
    • Classement des meilleures ventes d'Amazon: n°203.604 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
    •  Souhaitez-vous faire modifier les images ?


    En savoir plus sur l'auteur

    Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

    Commentaires en ligne

    4 étoiles
    0
    3 étoiles
    0
    2 étoiles
    0
    1 étoiles
    0
    5.0 étoiles sur 5
    5.0 étoiles sur 5
    Commentaires client les plus utiles
    1 internautes sur 1 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 Redécouvrir Netfiler 30 décembre 2007
    Par B. Romain
    Format:Broché|Achat vérifié
    A la recherche d'un outil de détection d'intrusion léger, j'ai finalement installé PSAD. C'est comme ca que je suis arrivé à ce livre.
    M.RASH est une référence dans le domaine de la sécurité et du filtrage de paquets en particulier.
    Le livre est excessivement bien fait, avance progressivement en partant d'une configuration de parefeu simple pour aller vers l'inspection de niveau applicatif, en expliquant clairement chaque étape.

    Sans être expert en système, il faut un peu deconnaissance sur le fonctionnement des parefeu et de Linux pour appécier ce livre.

    Avec ce livre, vous allez (re)découvrir la puissance de netfilter !
    Avez-vous trouvé ce commentaire utile ?
    Commentaires client les plus utiles sur Amazon.com (beta)
    Amazon.com: 5.0 étoiles sur 5  15 commentaires
    28 internautes sur 28 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 EXCELLENT on what it's on, but it may not be on what you think. 10 janvier 2008
    Par GoClick - Publié sur Amazon.com
    Format:Broché|Achat vérifié
    Make no mistake, this book is on what it says it's about "Attack Detection and Response with iptables, psad, and fwsnort" it contains very little information about setting up iptables to block unwanted external traffic.

    HOWEVER setting up iptables (in the basic sense) doesn't require an entire book. Sure there are whole books on that topic but there is no need for a 300 page book on it, that just seems to be the size computer books have to be in order to get published. Which means other books on iptables are probably going to about 250 pages of fluff.

    Incidentally this book actually only spends about the first 35 pages describing that, the remainder is fantastic, useful, well written information about doing the things that make iptables truly useful. "detection and response" ACTIVELY securing your system.

    In addition to being comprehensive and useful this book happens to be well written, far better than most technical books.

    If you're thinking about buying a book on Linux firewalls, make it this one, but if you're not already familiar with iptables expect to read the first 35 pages, then a couple online tutorials and then come back to this book.
    18 internautes sur 18 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 Nice, accurate and interesting. Not like other books about firewalls. 5 décembre 2007
    Par L. Garcia - Publié sur Amazon.com
    Format:Broché
    When I bought "Linux Firewalls" I was expecting a good book because I already knew that the work of Michael Rash is excellent. However, I expected the traditional Iptables handbook that looks more like a "man page". Surprisingly I found that the book was much better than that. Instead of detailing every single feature of the Iptables infrastructure, Michael Rash explains how Iptables can be used as a powerful (and free) Intrusion Detection/Prevention System. To achieve that, Rash presents three open source tools developed by himself: psad, an iptables-based port scan detector, fwsnort, a tool that translates snort rules into iptables sentences, and fwknop, a Port Knocking and SPA authentication system.

    The book is very practical. It's amazing how everything is presented so clearly and with such useful examples. The author first introduces the potential threats that are associated with the Network Layer, Transport Layer and Application Layer (I loved those chapters). Then he starts discussing the detection of malicious attackers that try to break into the system. Finally he presents active response mechanisms against attackers and ways to secure the whole system with additional layers of security.

    The book is great if what you want is to secure your Linux system using IPtables and the open source tools developed by Rash. Rash is an expert on firewalls and intrusion detection systems. If you follow his suggestions you'll build a very secure system. Firewall enthusiasts and TCP/IP fans will also enjoy reading the book because its written by a geek and its written for geeks. However, if you are looking for an Iptables handbook, you are looking for a theoretical book about Firewalls or you want to use other tools than the ones presented in the book, then "Linux Firewalls" may not be the best option for you.
    17 internautes sur 17 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 One of the best technical books published in 2007 20 décembre 2007
    Par Richard Bejtlich - Publié sur Amazon.com
    Format:Broché
    Disclaimer: I wrote the foreword for this book, so obviously I am biased. However, I am not financially compensated for this book's success.

    In the foreword I note that Linux Firewalls is a "great book." As a FreeBSD user, Linux Firewalls is good enough to make me consider using Linux in certain circumstances! Mike's book is exceptionally clear, organized, concise, and actionable. You should be able to read it and implement everything you find by following his examples. You will not only learn tools and techniques, but you will be able to appreciate Mike's keen defensive insights.

    The majority of the world's digital security professionals focus on defense, because offense is left to the bad guys, police, and military. I welcome books like Linux Firewalls that bring real defensive tools and techniques to the masses in a form that can be digested and deployed for minimum cost and effort.

    One of the main reasons Linux Firewalls is a great book is that Mike Rash is an excellent writer. I've read (or tried to read) plenty of books that seemed to offer helpful content, but the author had no clue how to deliver that content in a readable manner. Linux Firewalls makes learning network security an enjoyable experience. Mike is exceptionally detail-oriented (see the RST vs RST ACK issue on p 63 and elsewhere) and he often cites sources and additional references. Linux Firewalls very nicely integrates sample network traffic to make numerous points; Ch 11 has several great examples. The sections on Fwsnort even improved my understanding of Snort itself.

    The bottom line is that if you are a user of non-Microsoft operating systems (Linux, BSD, etc.) and you want to know how Linux can help defend your network, you will enjoy reading Linux Firewalls.
    12 internautes sur 12 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 A bit techy but good book 2 novembre 2007
    Par Anthony Lawrence - Publié sur Amazon.com
    Format:Broché
    Not for beginners, you need some tech background to get much out of this.

    ( Full text review at [...] )
    4 internautes sur 4 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 A great book 15 octobre 2007
    Par Franck Joncourt - Publié sur Amazon.com
    Format:Broché
    I have been looking forward to getting this book into my hands, since the other projects Michael Rash has led so far look quite impressive to me. Looking at his website [...], I discovered Single Packet Authorization (SPA) with Fwknop, and therefore put port-knocking aside, to give us a more secure and more reliable solution to access services such as SSH. He covers this point (SPA), and talks about psad and fwsnort as well to show how to enhance security and understand attacks using the famous iptables project from Netfilter.

    It is not a cook book to build iptables rules from scratch, and make something quite static, this book gives you the ablilities to create something dynamic, strong, and help you to monitor instrusions since the outside does not lack of imagination.

    Along this book, we follow a logic which leads us through the OSI reference model layers and M. Rash's projects to help us to harden our security system. I have been surprised on how everything is well-explained, and well-documented. Thus, this book provides us with technical explanations and references, code snippets, attack descriptions, and useful links on related topics. You will find in this book the answer on how to use active responses to attacks, how to gather data and get a visual representation of an attack..., as a matter of fact, everything you need or wanted to know.

    That's a great book.

    F. Joncourt
    Hardware/Software Engineer
    Ces commentaires ont-ils été utiles ?   Dites-le-nous
    Rechercher des commentaires
    Rechercher uniquement parmi les commentaires portant sur ce produit

    Discussions entre clients

    Le forum concernant ce produit
    Discussion Réponses Message le plus récent
    Pas de discussions pour l'instant

    Posez des questions, partagez votre opinion, gagnez en compréhension
    Démarrer une nouvelle discussion
    Thème:
    Première publication:
    Aller s'identifier
     

    Rechercher parmi les discussions des clients
    Rechercher dans toutes les discussions Amazon
       


    Rechercher des articles similaires par rubrique