Название: Firewalls and Internet Security. Second Edition Автор: Cheswick W.R. Страниц: 464 Формат: PDF Размер: 57 Mb Качество: Отличное Язык: Английский Год издания: 2003 ISBN: 978-0201634662
This book is all about Internet security, firewalls, VPNs and much more, all of which are hot topics and renowned buzzwords within today's IT industry.
In the first chapter, the authors express their view on network security and demonstrate the different methods an Administrator can use in order to secure their network(s). This is carried out by categorizing security into Host-Based and Perimeter security.
The second and third chapters are approximately 50 pages covering basic protocols, including IPv6, DNS, FTP, SNMP, NTP, RPC-based protocols and a several more like the famous NAT. The chapters are concluded with a summary on wireless security.
The next five chapters (chapter 4 to 8 inclusive), analyze various attacks used against networks and server operating systems in an attempt to exploit them. There is a wealth of information concerning hacking, allowing the reader to enter the mind of a hacker in terms of what they think and how they proceed to meet their goal.
One complete chapter is dedicated to various password tactics in which one can ensure that a hacker's life is made more difficult should they attempt to break into a few accounts using well-known methods related to password guessing. CHAP, PAP, Radius and PKI are also analyzed.
Chapter 9 to 12 are dedicated to Firewalls and VPNs which, in passing, happen to be my favourite chapters. They offer an in-depth analysis of the Firewall concept, packet filtering, application-level filtering and circuit level gateways. It proceeds with information about the filtering services, giving detailed examples on how one could use IPChains to create a simple or complex set of rules to efficiently block/permit packets entering in and out the network. This is perhaps the only downside to this informative book, where IPTables would have been beneficial to include, since people rarely use IPchains these days.
Lastly, chapter 12 talks about VPNs, their encryption methods, and considers both their weaknesses and advantages.
In addition to this, the book continues with several more chapters covering general questions that may arise for the reader, such as intranet routing, administration security and intrusion detection systems.
Towards the end, the authors talk about their personal experiences with people trying to hack into their companies and, as a result, explain the step- by- step process of how they managed to fight them and secure their networks. These pages are simply a goldmine for anyone interested in this area.
Table of Contents:
1. Introduction. 2. A Security Review of Protocols: Lower Layers. 3. Security Review: The Upper Layers. 4. The Web: Threat or Menace? 5. Classes of Attacks. 6. The Hacker's Workbench, and Other Munitions. 7. Authentication. 8. Using Some Tools and Services. 9. Kinds of Firewalls. 10. Filtering Services. 11. Firewall Engineering. 12. Tunneling and VPNs. 13. Network Layout. 14. Safe Hosts in a Hostile Environment. 15. Intrusion Detection. 16. Une Soirie avec Berferd. 17. The Taking of Clark. 18. Secure Communications over Insecure Networks. 19. Where Do We Go from Here?
Электронная библиотека Kodges.ru — интересный ресурс для тех, кто не любит тратить много времени на поиск необходимого издания. В каталогах представлено огромное количество книг различной тематики, которые можно скачать совершенно бесплатно в нужном формате. В разделе «Компьютерная литература» можно скачать как книги для профессионалов, так и книги с ответами на популярные вопросы, например, «Firewalls and Internet Security. Second Edition». Благодаря удобной навигации библиотеки, каждый читатель моментально найдет необходимое издание.