Book description
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses in the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers will learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers.
Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion.
The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and describes the tools and techniques used to perpetrate--and prevent--such attacks. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through a critical examination of problems and practices on today's intranets, as well as discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions about the future of firewalls and Internet security.
The book's appendixes provide an introduction to cryptography and a list of resources (also posted to the book's Web site) that readers can rely on for tracking further security developments.
Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make security decisions that will make the Internet--and their computers--safer.
020163466XB01302003
Table of contents
- Copyright
- Addison-Wesley Professional Computing Series
- Preface to the Second Edition
- Preface to the First Edition
-
I. Getting Started
- 1. Introduction
- 2. A Security Review of Protocols: Lower Layers
-
3. Security Review: The Upper Layers
- 3.1. Messaging
- 3.2. Internet Telephony
- 3.3. RPC-Based Protocols
- 3.4. File Transfer Protocols
- 3.5. Remote Login
- 3.6. Simple Network Management Protocol—SNMP
- 3.7. The Network Time Protocol
- 3.8. Information Services
- 3.9. Proprietary Protocols
- 3.10. Peer-to-Peer Networking
- 3.11. The X11 Window System
- 3.12. The Small Services
- 4. The Web: Threat or Menace?
-
II. The Threats
-
5. Classes of Attacks
- 5.1. Stealing Passwords
- 5.2. Social Engineering
- 5.3. Bugs and Back Doors
- 5.4. Authentication Failures
- 5.5. Protocol Failures
- 5.6. Information Leakage
- 5.7. Exponential Attacks—Viruses and Worms
- 5.8. Denial-of-Service Attacks
- 5.9. Botnets
- 5.10. Active Attacks
-
6. The Hacker’s Workbench, and Other Munitions
- 6.1. Introduction
- 6.2. Hacking Goals
- 6.3. Scanning a Network
- 6.4. Breaking into the Host
- 6.5. The Battle for the Host
- 6.6. Covering Tracks
- 6.7. Metastasis
-
6.8. Hacking Tools
- 6.8.1. Crack—Dictionary Attacks on Unix Passwords
- 6.8.2. Dsniff—Password Sniffing Tool
- 6.8.3. Nmap—Find and Identify Hosts
- 6.8.4. Nbaudit—Check NetBIOS Share Information
- 6.8.5. Juggernaut—TCP Hijack Tool
- 6.8.6. Nessus—Port Scanning
- 6.8.7. DDoS Attack Tools
- 6.8.8. Ping of Death—Issuing Pathological Packets
- 6.8.9. Virus Construction Kits
- 6.8.10. Other Tools
- 6.9. Tiger Teams
-
5. Classes of Attacks
-
III. Safer Tools and Services
- 7. Authentication
-
8. Using Some Tools and Services
- 8.1. Inetd—Network Services
- 8.2. Ssh—Terminal and File Access
- 8.3. Syslog
- 8.4. Network Administration Tools
- 8.5. Chroot—Caging Suspect Software
- 8.6. Jailing the Apache Web Server
- 8.7. Aftpd—A Simple Anonymous FTP Daemon
- 8.8. Mail Transfer Agents
- 8.9. POP3 and IMAP
- 8.10. Samba: An SMB Implementation
- 8.11. Taming Named
- 8.12. Adding SSL Support with Sslwrap
-
IV. Firewalls and VPNs
- 9. Kinds of Firewalls
- 10. Filtering Services
- 11. Firewall Engineering
- 12. Tunneling and VPNs
-
V. Protecting an Organization
- 13. Network Layout
- 14. Safe Hosts in a Hostile Environment
- 15. Intrusion Detection
- VI. Lessons Learned
- VII. Appendixes
- Bibliography
- List of s
- List of Acronyms
Product information
- Title: Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
- Author(s):
- Release date: February 2003
- Publisher(s): Addison-Wesley Professional
- ISBN: 9780201634662
You might also like
book
Network Security First-Step, Second Edition
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world …
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …
book
Computer Science Security
This book serves as a guide to help the reader develop an awareness of security vulnerabilities …
book
Cryptography and Network Security
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is …