Firewalls and Internet Security: Repelling the Wily Hacker
by William R. Cheswick, Steven M. Bellovin
Publisher: Addison-Wesley 1994
ISBN/ASIN: B000OOQ4R0
Description:
The book gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.
Download or read it online for free here:
Download link
(multiple PDF files)
Similar books
Intrusion Detection with SNORT
by Rafeeq Ur Rehman - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(16123 views)
by Rafeeq Ur Rehman - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(16123 views)
Open Source Security Tools: Practical Guide to Security Applications
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(17217 views)
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(17217 views)
Nmap Network Scanning
by Gordon Fyodor Lyon - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(19597 views)
by Gordon Fyodor Lyon - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(19597 views)
Guide to Securing Intranet and Extranet Servers
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(11663 views)
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(11663 views)