Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Some of this coverage is very basic indeed ("What's an IP address?" and "What's a good Password" are two elementary sidebars), but that's in keeping with this series, which is intended for managers and others somewhat removed from detail work as well as for technicians. Still, the differences between OpenBSD and Linux boil down to a couple of key features, and you'll find yourself halfway through this book before you get to any how-to material on configuring a firewall. The configuration information is easy to follow: the authors explain which options to choose in the operating systems' respective installation routines and outline some supplementary procedures to follow afterward.
This book deserves kudos for treating OpenBSD with the same respect most books lavish over the trendier Linux, and the odds are good you'll learn a lot about it. You'll find the general security material valuable as well, particularly if you're new to the security game and need a primer on firewalls, demilitarized zones (DMZs), and the vulnerabilities of particular protocols and services. Still, this isn't the best practical guide around. Look at Linux Firewalls for detailed information on configuring IP chains under Linux, Maximum Linux Security for an all-purpose take on that system's security characteristics, and Firewalls and Internet Security: Repelling the Wily Hacker for further comprehensive security coverage. --David Wall
Topics covered: Internet security background, fundamentals of firewall design and security policy, the relative merits of OpenBSD and Linux, and the configuration of bare-metal machines as firewalls under both operating systems. The authors use Red Hat Linux 6 and OpenBSD 2.5.
This is a great book for people who already know that they want to deploy a free open source firewall solution to secure their network. While somewhat dated (e.g. Read morePublished on September 4, 2002 by Dr Anton Chuvakin
This book is VERY well written. It was one of the very best technical books I have ever read. Some of the info is a little dated, but the topics discussed are GREAT history. Read morePublished on May 6, 2002 by Bill Sterzenbach
This book is awesome. It assumes no prior networking experience and walks you through networking basics as well as basic security issues such as Denial of Service, spoofing, etc. Read morePublished on February 1, 2002 by Amazon Customer
This book is useless to anyone able to use an internet browser. I love the style, but it disguises a useless waste of paper. Two years ago, this would have been a marvelous book. Read morePublished on November 15, 2001
I have read this book at least 2 times in the past few months - it is an easy, but very good read that explores lots of concepts and practical steps. Chapter 3 definitely rocks!Published on October 1, 2000 by Mark Wolfgang
While this book does have lots of examples, I don't like this book because more then %50 is filler. I don't want another book explaining how to install linux/bsd, or what an IP... Read morePublished on July 17, 2000 by Dan Evans
A really good book and also a fun read (nothing dry and boring about this one). If you've had any formal education if computer science, it's likely you'll know a lot of what's in... Read morePublished on June 19, 2000