|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn192096519 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
080219s2007 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d TXJ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCE
|d OCLCQ
|d OCLCO
|d CNNAI
|d OCLCF
|d OCLCQ
|d COO
|d OCLCQ
|d UAB
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 777887869
|a 1044219182
|a 1056380641
|a 1097161901
|
020 |
|
|
|a 1593271417
|
020 |
|
|
|a 9781593271411
|
029 |
1 |
|
|a AU@
|b 000067098580
|
029 |
1 |
|
|a DEBSZ
|b 355442868
|
029 |
1 |
|
|a HEBIS
|b 291513174
|
035 |
|
|
|a (OCoLC)192096519
|z (OCoLC)777887869
|z (OCoLC)1044219182
|z (OCoLC)1056380641
|z (OCoLC)1097161901
|
037 |
|
|
|a CL0500000018
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b R37 2007
|
082 |
0 |
4 |
|a 005.8 R224 2007 [ONLINE]
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rash, Michael.
|
245 |
1 |
0 |
|a Linux firewalls /
|c by Michael Rash.
|
260 |
|
|
|a San Francisco :
|b No Starch Press,
|c 2007.
|
300 |
|
|
|a 1 online resource (xix, 308 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Ch. 1. Care and Feeding of iptables -- Ch. 2. Network Layer Attacks and Defense -- Ch. 3. Transport Layer Attacks and Defense -- Ch. 4. Application Layer Attacks and Defense -- Ch. 5. Introducing psad: The Port Scan Attack Detector -- Ch. 6. Psad Operations: Detecting Suspicious Traffic -- Ch. 7. Advanced psad Topics: From Signature Matching to OS Fingerprinting -- Ch. 8. Active Response with psad -- Ch. 9. Translating Snort Rules into iptables Rules -- Ch. 10. Deploying fwsnort -- Ch. 11. Combining psad and fwsnort -- Ch. 12. Port Knocking vs. Single Packet Authorization -- Ch. 13. Introducing fwknop -- Ch. 14. Visualizing iptables Logs -- App. A. Attack Spoofing -- App. B.A Complete fwsnort Script.
|
520 |
1 |
|
|a "Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop."--Jacket
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux.
|2 blmlsh
|
630 |
0 |
7 |
|a Linux
|2 fast
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
7 |
|a Computers
|x Access control.
|2 blmlsh
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 blmlsh
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Online version:
|a Rash, Michael.
|t Linux firewalls.
|d San Francisco : No Starch Press, 2007
|w (OCoLC)777887869
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781593271411/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|