Building Internet Firewalls, Paperback by Zwicky, Elizabeth D.; Cooper, Simon...

MongrelDotCom
(118)
Registered as a private seller
Consumer protection regulations resulting from EU consumer law are therefore not applicable. eBay buyer protection still applies to most purchases.
US $10.00
ApproximatelyEUR 8.65
Condition:
Acceptable
Breathe easy. Returns accepted.
Postage:
Located in: Alexandria, Virginia, United States
Delivery:
Varies
Returns:
14 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:205836694484

Item specifics

Condition
Acceptable: A book with obvious wear. May have some damage to the book cover but the book is still ...
Book Title
Building Internet Firewalls
ISBN
9781565928718
Category

About this product

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1565928717
ISBN-13
9781565928718
eBay Product ID (ePID)
1680057

Product Key Features

Number of Pages
894 Pages
Language
English
Publication Name
Building Internet Firewalls : Internet and Web Security
Subject
Security / Online Safety & Privacy, General, Security / Networking
Publication Year
2000
Type
Textbook
Author
Simon Cooper, D. Brent Chapman, Elizabeth D. Zwicky
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
1.8 in
Item Weight
53.3 Oz
Item Length
9.3 in
Item Width
7.6 in

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
00-039954
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface Part I: Network Security Chapter 1: Why Internet Firewalls? Chapter 2: Internet Services Chapter 3: Security Strategies Part II: Building Firewalls Chapter 4: Packets and Protocols Chapter 5: Firewall Technologies Chapter 6: Firewall Architectures Chapter 7: Firewall Design Chapter 8: Packet Filtering Chapter 9: Proxy Systems Chapter 10: Bastion Hosts Chapter 11: Unix and Linux Bastion Hosts Chapter 12: Windows NT and Windows 2000 Bastion Hosts Part III: Internet Services Chapter 13: Internet Services and Firewalls Chapter 14: Intermediary Protocols Chapter 15: The World Wide Web Chapter 16: Electronic Mail and News Chapter 17: File Transfer, File Sharing, and Printing Chapter 18: Remote Access to Hosts Chapter 19: Real-Time Conferencing Services Chapter 20: Naming and Directory Services Chapter 21: Authentication and Auditing Services Chapter 22: Administrative Services Chapter 23: Databases and Games Chapter 24: Two Sample Firewalls Part IV: Keeping Your Site Secure Chapter 25: Security Policies Chapter 26: Maintaining Firewalls Chapter 27: Responding to Security Incidents Part V: Appendixes Appendix A: Resources Appendix B: Tools Appendix C: Cryptography Colophon
Synopsis
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, "Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.
LC Classification Number
TK5105.59.Z85 2000

Item description from the seller

About this seller

MongrelDotCom

98.5% positive Feedback176 items sold

Joined Mar 1999
Usually responds within 24 hours
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Ready to find something special? Discover your next unique treasure at MongrelDotCom! We cater to every passion, whether you're a passionate collector, a serious gamer, a music lover, or a business ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
4.7
Reasonable postage cost
4.8
Delivery time
5.0
Communication
5.0

Seller Feedback (83)

All ratingsselected
Positive
Neutral
Negative
  • s***s (1151)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    I've been on ebay 27 years and this was one of my top five buying experiences. The seller answered numerous questions quickly, sent extra photographs, accepted my offer, and shipped the robots quickly and very securely in large amounts of bubble wrap. I cannot think of enough adjectives to describe this wonderful seller! Thanks so much for everything.
  • e***t (440)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Yamaha NS-6490 3 Way Bookshelf Speakers - Used - 140 Watts matches listing description. Fair price. Pro ebay shipper. A++++!!!
  • a***l (214)- Feedback left by buyer.
    Past year
    Verified purchase
    Item arrived securely packaged, shipped at a fair price and it arrived a day earlier than anticipated! Seller worked through a mix-up with me, and was professional and friendly throughout the process. Thank you for a good transaction.