Firewalls and Internet Security: Repelling the Wily Hacker
by William R. Cheswick, Steven M. Bellovin
Publisher: Addison-Wesley 1994
ISBN/ASIN: B000OOQ4R0
Description:
The book gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.
Download or read it online for free here:
Download link
(multiple PDF files)
Similar books
Information Security and Privacy in Network Environments
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(9629 views)
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(9629 views)
Open Source Security Tools: Practical Guide to Security Applications
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(17472 views)
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(17472 views)
Forensic Discovery
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(19075 views)
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(19075 views)
Understanding OSI
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(21588 views)
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(21588 views)