Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Building Internet Firewalls, Paperback by Zwicky, Elizabeth D.; Cooper, Simon...
US $10.00
ApproximatelyEUR 8.65
Condition:
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Located in: Alexandria, Virginia, United States
Delivery:
Varies
Returns:
14 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:205836694484
Item specifics
- Condition
- Book Title
- Building Internet Firewalls
- ISBN
- 9781565928718
About this product
Product Identifiers
Publisher
O'reilly Media, Incorporated
ISBN-10
1565928717
ISBN-13
9781565928718
eBay Product ID (ePID)
1680057
Product Key Features
Number of Pages
894 Pages
Language
English
Publication Name
Building Internet Firewalls : Internet and Web Security
Subject
Security / Online Safety & Privacy, General, Security / Networking
Publication Year
2000
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.8 in
Item Weight
53.3 Oz
Item Length
9.3 in
Item Width
7.6 in
Additional Product Features
Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
00-039954
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface Part I: Network Security Chapter 1: Why Internet Firewalls? Chapter 2: Internet Services Chapter 3: Security Strategies Part II: Building Firewalls Chapter 4: Packets and Protocols Chapter 5: Firewall Technologies Chapter 6: Firewall Architectures Chapter 7: Firewall Design Chapter 8: Packet Filtering Chapter 9: Proxy Systems Chapter 10: Bastion Hosts Chapter 11: Unix and Linux Bastion Hosts Chapter 12: Windows NT and Windows 2000 Bastion Hosts Part III: Internet Services Chapter 13: Internet Services and Firewalls Chapter 14: Intermediary Protocols Chapter 15: The World Wide Web Chapter 16: Electronic Mail and News Chapter 17: File Transfer, File Sharing, and Printing Chapter 18: Remote Access to Hosts Chapter 19: Real-Time Conferencing Services Chapter 20: Naming and Directory Services Chapter 21: Authentication and Auditing Services Chapter 22: Administrative Services Chapter 23: Databases and Games Chapter 24: Two Sample Firewalls Part IV: Keeping Your Site Secure Chapter 25: Security Policies Chapter 26: Maintaining Firewalls Chapter 27: Responding to Security Incidents Part V: Appendixes Appendix A: Resources Appendix B: Tools Appendix C: Cryptography Colophon
Synopsis
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, "Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.
LC Classification Number
TK5105.59.Z85 2000
Item description from the seller
About this seller
MongrelDotCom
98.5% positive Feedback•176 items sold
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Seller Feedback (83)
- s***s (1151)- Feedback left by buyer.Past 6 monthsVerified purchaseI've been on ebay 27 years and this was one of my top five buying experiences. The seller answered numerous questions quickly, sent extra photographs, accepted my offer, and shipped the robots quickly and very securely in large amounts of bubble wrap. I cannot think of enough adjectives to describe this wonderful seller! Thanks so much for everything.Mego Gigantor Robot - 1970 - 17 inch - Very Rare - Vintage - Cool! Working (#205544900791)
- e***t (440)- Feedback left by buyer.Past 6 monthsVerified purchaseYamaha NS-6490 3 Way Bookshelf Speakers - Used - 140 Watts matches listing description. Fair price. Pro ebay shipper. A++++!!!
- a***l (214)- Feedback left by buyer.Past yearVerified purchaseItem arrived securely packaged, shipped at a fair price and it arrived a day earlier than anticipated! Seller worked through a mix-up with me, and was professional and friendly throughout the process. Thank you for a good transaction.1988 Teenage Mutant Ninja Turtles Raphael Moc Action Figure 5003 - Unpunched! (#205364465835)
More to explore:
- Simon Beckett Paperback Fiction Books,
- Simon & Schuster Fiction Paperback Fiction & Books,
- Simon Beckett Paperback Fiction & Thriller Fiction Books,
- Simon & Schuster Non-Fiction Paperback Fiction & Books,
- Non-Fiction Simon & Schuster Building Fiction & Books,
- Elizabeth Lowell Fiction Paperback Fiction & Books,
- Simon Beckett Fiction Paperback Fiction & Non-Fiction Books in German,
- Simon Beckett Fiction Paperback Fiction & Non-Fiction Books in English,
- Antiquarian & Collectable D. H. Lawrence Paperback Books,
- Simon Beckett Crime & Thriller Fiction Paperback Pre - 1700 & Fiction Books

