Linux Firewalls: Attack Detection and Response and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $49.95
  • Save: $8.10 (16%)
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Used: Like New | Details
Condition: Used: Like New
Comment: OVERNIGHT and 2-DAY SHIPPING AVAILABLE.......Like New condition. The item is in Amazon's warehouse and shipped to you by Amazon. You have the assurance that you will get your item in a timely manner. In the unlikely event something should go wrong with the shipping, you can contact Amazon to assist with the customer service, tracking or hassle-free return. We are very proud to be in this program as it allows us to offer the best customer experience possible.
Trade in your item
Get a $5.95
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort Paperback – September 15, 2007


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$41.85
$17.35 $16.49



Frequently Bought Together

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort + Linux iptables Pocket Reference + Linux Firewalls (3rd Edition)
Price for all three: $81.37

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 336 pages
  • Publisher: No Starch Press; 1 edition (September 15, 2007)
  • Language: English
  • ISBN-10: 1593271417
  • ISBN-13: 978-1593271411
  • Product Dimensions: 9.1 x 7.1 x 1 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #159,562 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5.0 out of 5 stars
5 star
12
4 star
0
3 star
0
2 star
0
1 star
0
See all 12 customer reviews
Chapter 5 started the story of the port scan attack detector.
SK Kim
Thus, this book provides us with technical explanations and references, code snippets, attack descriptions, and useful links on related topics.
Franck Joncourt
If you are looking to build a personal security "toolbox" for linux, then I recommend you consider this book.
Harvey Muller

Most Helpful Customer Reviews

28 of 28 people found the following review helpful By GoClick on January 10, 2008
Format: Paperback Verified Purchase
Make no mistake, this book is on what it says it's about "Attack Detection and Response with iptables, psad, and fwsnort" it contains very little information about setting up iptables to block unwanted external traffic.

HOWEVER setting up iptables (in the basic sense) doesn't require an entire book. Sure there are whole books on that topic but there is no need for a 300 page book on it, that just seems to be the size computer books have to be in order to get published. Which means other books on iptables are probably going to about 250 pages of fluff.

Incidentally this book actually only spends about the first 35 pages describing that, the remainder is fantastic, useful, well written information about doing the things that make iptables truly useful. "detection and response" ACTIVELY securing your system.

In addition to being comprehensive and useful this book happens to be well written, far better than most technical books.

If you're thinking about buying a book on Linux firewalls, make it this one, but if you're not already familiar with iptables expect to read the first 35 pages, then a couple online tutorials and then come back to this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
18 of 18 people found the following review helpful By L. Garcia on December 5, 2007
Format: Paperback
When I bought "Linux Firewalls" I was expecting a good book because I already knew that the work of Michael Rash is excellent. However, I expected the traditional Iptables handbook that looks more like a "man page". Surprisingly I found that the book was much better than that. Instead of detailing every single feature of the Iptables infrastructure, Michael Rash explains how Iptables can be used as a powerful (and free) Intrusion Detection/Prevention System. To achieve that, Rash presents three open source tools developed by himself: psad, an iptables-based port scan detector, fwsnort, a tool that translates snort rules into iptables sentences, and fwknop, a Port Knocking and SPA authentication system.

The book is very practical. It's amazing how everything is presented so clearly and with such useful examples. The author first introduces the potential threats that are associated with the Network Layer, Transport Layer and Application Layer (I loved those chapters). Then he starts discussing the detection of malicious attackers that try to break into the system. Finally he presents active response mechanisms against attackers and ways to secure the whole system with additional layers of security.

The book is great if what you want is to secure your Linux system using IPtables and the open source tools developed by Rash. Rash is an expert on firewalls and intrusion detection systems. If you follow his suggestions you'll build a very secure system. Firewall enthusiasts and TCP/IP fans will also enjoy reading the book because its written by a geek and its written for geeks. However, if you are looking for an Iptables handbook, you are looking for a theoretical book about Firewalls or you want to use other tools than the ones presented in the book, then "Linux Firewalls" may not be the best option for you.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
16 of 16 people found the following review helpful By Richard Bejtlich on December 20, 2007
Format: Paperback
Disclaimer: I wrote the foreword for this book, so obviously I am biased. However, I am not financially compensated for this book's success.

In the foreword I note that Linux Firewalls is a "great book." As a FreeBSD user, Linux Firewalls is good enough to make me consider using Linux in certain circumstances! Mike's book is exceptionally clear, organized, concise, and actionable. You should be able to read it and implement everything you find by following his examples. You will not only learn tools and techniques, but you will be able to appreciate Mike's keen defensive insights.

The majority of the world's digital security professionals focus on defense, because offense is left to the bad guys, police, and military. I welcome books like Linux Firewalls that bring real defensive tools and techniques to the masses in a form that can be digested and deployed for minimum cost and effort.

One of the main reasons Linux Firewalls is a great book is that Mike Rash is an excellent writer. I've read (or tried to read) plenty of books that seemed to offer helpful content, but the author had no clue how to deliver that content in a readable manner. Linux Firewalls makes learning network security an enjoyable experience. Mike is exceptionally detail-oriented (see the RST vs RST ACK issue on p 63 and elsewhere) and he often cites sources and additional references. Linux Firewalls very nicely integrates sample network traffic to make numerous points; Ch 11 has several great examples. The sections on Fwsnort even improved my understanding of Snort itself.

The bottom line is that if you are a user of non-Microsoft operating systems (Linux, BSD, etc.) and you want to know how Linux can help defend your network, you will enjoy reading Linux Firewalls.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
12 of 12 people found the following review helpful By Anthony Lawrence VINE VOICE on November 1, 2007
Format: Paperback
Length: 2:41 Mins
Not for beginners, you need some tech background to get much out of this.

( Full text review at [...] )
2 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Franck Joncourt on October 15, 2007
Format: Paperback
I have been looking forward to getting this book into my hands, since the other projects Michael Rash has led so far look quite impressive to me. Looking at his website [...], I discovered Single Packet Authorization (SPA) with Fwknop, and therefore put port-knocking aside, to give us a more secure and more reliable solution to access services such as SSH. He covers this point (SPA), and talks about psad and fwsnort as well to show how to enhance security and understand attacks using the famous iptables project from Netfilter.

It is not a cook book to build iptables rules from scratch, and make something quite static, this book gives you the ablilities to create something dynamic, strong, and help you to monitor instrusions since the outside does not lack of imagination.

Along this book, we follow a logic which leads us through the OSI reference model layers and M. Rash's projects to help us to harden our security system. I have been surprised on how everything is well-explained, and well-documented. Thus, this book provides us with technical explanations and references, code snippets, attack descriptions, and useful links on related topics. You will find in this book the answer on how to use active responses to attacks, how to gather data and get a visual representation of an attack..., as a matter of fact, everything you need or wanted to know.

That's a great book.

F. Joncourt
Hardware/Software Engineer
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?