Logo

Firewalls and Internet Security: Repelling the Wily Hacker

Small book cover: Firewalls and Internet Security: Repelling the Wily Hacker

Firewalls and Internet Security: Repelling the Wily Hacker
by

Publisher: Addison-Wesley
ISBN/ASIN: B000OOQ4R0

Description:
The book gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: Network Security ToolsNetwork Security Tools
by - O'Reilly Media, Inc.
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools.
(15961 views)
Book cover: Firewalls CompleteFirewalls Complete
by - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(12984 views)
Book cover: Ethical HackingEthical Hacking

Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(7360 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(19223 views)