Logo

Firewalls and Internet Security: Repelling the Wily Hacker

Small book cover: Firewalls and Internet Security: Repelling the Wily Hacker

Firewalls and Internet Security: Repelling the Wily Hacker
by

Publisher: Addison-Wesley
ISBN/ASIN: B000OOQ4R0

Description:
The book gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: Snort CookbookSnort Cookbook
by - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
(7552 views)
Book cover: Ethical HackingEthical Hacking

Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(3736 views)
Book cover: Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(12768 views)
Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(8915 views)