Building Internet Firewalls, Paperback by Zwicky, Elizabeth D.; Cooper, Simon...

10,00 $US
Environ14,04 $C
État :
Acceptable
Ayez l'esprit tranquille. Renvois acceptés.
Expédition :
9,74 $US (environ 13,68 $C) USPS Ground Advantage®.
Lieu : Alexandria, Virginia, États-Unis
Livraison :
Livraison prévue entre le lun. 17 nov. et le jeu. 20 nov. à 94104
Les dates de livraison approximatives – s'ouvre dans une nouvelle fenêtre ou un nouvel onglet tiennent compte du délai de manutention du vendeur, du code postal de l'expéditeur, du code postal du destinataire et de l'heure de l'acceptation et dépendent du service d'expédition sélectionné et de la réception du paiementréception du paiement - s'ouvre dans une nouvelle fenêtre ou un nouvel onglet. Les délais de livraison peuvent varier, particulièrement lors de périodes achalandées.
Renvois :
Renvoi sous 14 jours. L'acheteur paie les frais de renvoi. Si vous utilisez une étiquette d'envoi eBay, son coût sera déduit du montant de votre remboursement.
Paiements :
     Diners Club

Magasinez en toute confiance

Garantie de remboursement eBay
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :205836694484

Caractéristiques de l'objet

État
Acceptable: Un livre présentant des traces d'usure apparentes. Sa couverture peut être endommagée, ...
Book Title
Building Internet Firewalls
ISBN
9781565928718

À propos de ce produit

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1565928717
ISBN-13
9781565928718
eBay Product ID (ePID)
1680057

Product Key Features

Number of Pages
894 Pages
Language
English
Publication Name
Building Internet Firewalls : Internet and Web Security
Subject
Security / Online Safety & Privacy, General, Security / Networking
Publication Year
2000
Type
Textbook
Author
Simon Cooper, D. Brent Chapman, Elizabeth D. Zwicky
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
1.8 in
Item Weight
53.3 Oz
Item Length
9.3 in
Item Width
7.6 in

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
00-039954
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface Part I: Network Security Chapter 1: Why Internet Firewalls? Chapter 2: Internet Services Chapter 3: Security Strategies Part II: Building Firewalls Chapter 4: Packets and Protocols Chapter 5: Firewall Technologies Chapter 6: Firewall Architectures Chapter 7: Firewall Design Chapter 8: Packet Filtering Chapter 9: Proxy Systems Chapter 10: Bastion Hosts Chapter 11: Unix and Linux Bastion Hosts Chapter 12: Windows NT and Windows 2000 Bastion Hosts Part III: Internet Services Chapter 13: Internet Services and Firewalls Chapter 14: Intermediary Protocols Chapter 15: The World Wide Web Chapter 16: Electronic Mail and News Chapter 17: File Transfer, File Sharing, and Printing Chapter 18: Remote Access to Hosts Chapter 19: Real-Time Conferencing Services Chapter 20: Naming and Directory Services Chapter 21: Authentication and Auditing Services Chapter 22: Administrative Services Chapter 23: Databases and Games Chapter 24: Two Sample Firewalls Part IV: Keeping Your Site Secure Chapter 25: Security Policies Chapter 26: Maintaining Firewalls Chapter 27: Responding to Security Incidents Part V: Appendixes Appendix A: Resources Appendix B: Tools Appendix C: Cryptography Colophon
Synopsis
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, "Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.
LC Classification Number
TK5105.59.Z85 2000

Description de l'objet du vendeur

À propos de ce vendeur

MongrelDotCom

98,5% d'évaluations positives176 objets vendus

Membre depuis : mars 1999
Répond généralement en 24 heures
Ready to find something special? Discover your next unique treasure at MongrelDotCom! We cater to every passion, whether you're a passionate collector, a serious gamer, a music lover, or a business ...
Plus
Visiter la BoutiqueContacter

Évaluations détaillées du vendeur

Moyenne au cours des 12 derniers mois
Qualité de la description
4.7
Justesse des frais d'expédition
4.8
Rapidité de l'expédition
5.0
Communication
5.0

Évaluations comme vendeur (85)

Toutes les évaluationsselected
Positives
Neutres
Négatives
  • s***s (1151)- Évaluation laissée par l'acheteur.
    Six derniers mois
    Achat vérifié
    I've been on ebay 27 years and this was one of my top five buying experiences. The seller answered numerous questions quickly, sent extra photographs, accepted my offer, and shipped the robots quickly and very securely in large amounts of bubble wrap. I cannot think of enough adjectives to describe this wonderful seller! Thanks so much for everything.
  • e***t (440)- Évaluation laissée par l'acheteur.
    Six derniers mois
    Achat vérifié
    Yamaha NS-6490 3 Way Bookshelf Speakers - Used - 140 Watts matches listing description. Fair price. Pro ebay shipper. A++++!!!
  • a***l (215)- Évaluation laissée par l'acheteur.
    Dernière année
    Achat vérifié
    Item arrived securely packaged, shipped at a fair price and it arrived a day earlier than anticipated! Seller worked through a mix-up with me, and was professional and friendly throughout the process. Thank you for a good transaction.