Cargando…

Firewalls and Internet Security : Repelling the Wily Hacker, Second Edition

The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the security problems companies face in t...

Descripción completa

Detalles Bibliográficos
Autores principales: Cheswick, William (Autor), Bellovin, Steven (Autor), Rubin, Aviel (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Addison-Wesley Professional, 2003.
Edición:2nd edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1159660960
003 OCoLC
005 20231017213018.0
006 m u
007 cr cn|||||||||
008 150904s2003 xx o ||| 0 eng d
040 |a UKBTH  |b eng  |c UKBTH  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 020163466X 
020 |z 9780201634662 
024 8 |a 9780201634662 
024 8 |a 020163466X 
035 |a (OCoLC)1159660960 
082 0 4 |a 005.8  |q OCoLC  |2 20/eng/20230216 
049 |a UAMI 
100 1 |a Cheswick, William,  |e author. 
245 1 0 |a Firewalls and Internet Security :  |b Repelling the Wily Hacker, Second Edition  |h [electronic resource] /  |c Cheswick, William. 
250 |a 2nd edition. 
264 1 |b Addison-Wesley Professional,  |c 2003. 
300 |a 1 online resource (464 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 59.99 
520 |a The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses in the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers will learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion. The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and describes the tools and techniques used to perpetrate--and prevent--such attacks. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through a critical examination of problems and practices on today's intranets, as well as discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions about the future of firewalls and Internet security. The book's appendixes provide an introduction to cryptography and a list of resources (also posted to the book's Web site) that readers can rely on for tracking further security developments. Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make security decisions that will make the Internet--and their computers--safer. 020163466XB01302003. 
542 |f Copyright © 2003 by AT&T and Lumeta Corproation  |g 2003 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Bellovin, Steven,  |e author. 
700 1 |a Rubin, Aviel,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/020163466X/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP