- Series: Addison-Wesley Professional Computing
- Paperback: 320 pages
- Publisher: Addison-Wesley Professional (April 30, 1994)
- Language: English
- ISBN-10: 0201633574
- ISBN-13: 978-0201633573
- Product Dimensions: 7.2 x 0.8 x 9.2 inches
- Shipping Weight: 1.4 pounds (View shipping rates and policies)
- Average Customer Review: 24 customer reviews
- Amazon Best Sellers Rank: #4,263,758 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Firewalls and Internet Security: Repelling The Wily Hacker (Addison-Wesley Professional Computing)
Use the Amazon App to scan ISBNs and compare prices.
There is a newer edition of this item:
"Neverworld Wake" by Marisha Pessl
Read the absorbing new psychological suspense thriller from acclaimed New York Times bestselling author Marisha Pessl. Learn more
Frequently bought together
Customers who bought this item also bought
Essential information for anyone wanting to protect Internet-connected computers from unauthorized access. Includes:
- thorough discussion of security-related aspects of TCP/IP;
- step-by-step plans for setting up firewalls;
- hacking and monitoring tools the authors have built to rigorously test and maintain firewalls;
- pointers to public domain security tools on the net;
- first-hand step-by-step accounts of battles with the "Berferd" hackers; and
- practical discussions of the legal aspects of security.
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it. In addition, there is vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security. With Firewalls and Internet Security, anyone will be well equipped to provide their organization with effective protection from the wily Internet hacker. -- Midwest Book Review
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
More than a mere book on firewalls, this is a primer for the entire workings of the Internet Protocols. It has clear explanations of DNS, DHCP, TCP, UDP, ICMP, SSL, FTP and many other protocols without all the nitty gritty details that you'll find in a book like "TCP/IP Illustrated." <http://www.amazon.com/TCP-IP-Illustrated-Vol-Protocols/dp/0201633469>, which I recommend if you need more technical detail.
The authors describe the risks associated with the protocols and strategies for protecting your systems. But, they go further, and explain other attacks and how they might circumvent the barriers that a sysadmin might erect.
The exposition on Firewalls and VPNs (Virtual Private Networks) begins in Part IV. There are specific strategies given for protecting several protocols. No specifics on CISCO PIX, sorry guys, the examples use software generally available on Unix (FreeBSD). But, that's mainly a syntax issue, the principles are the same for the large comercial firewall systems. But, once again, if you need specifics, you'll need to read the manuals. This book will give you the foundation to understand what you read in the manuals. Firewall manuals are dry in comparison and generally lack strategic recommendations.
The first appendix does a decent job of explaining public key cryptography. The second appendix is "dated" though in that it attempts to give "links" to other resources. After 7+ years, you can imagine the problems with that.
Likewise the bibliography mainly cites texts from the 1990's; although there is one reference from 1872: "Through the Looking Glass", Lewis Carroll. Typical of the entertaining quotes throughout the book, "When I use a word. . .it means just what I choose it to mean, neither more nor less." And perhaps that's a fitting summary of this book's purpose, to familiarize you with the meanings of the "Carrollesque" words associated with Internet Security.
This book is well done for what it is... a basic outline of why friewalls started to be needed and how come things worked the way they did. It is not too hard for someone that can read english but perhaps not computer gik talk.
The world has moved on and this stuff is of little use to todays computer user... i.e. the big bad KGB has the codes they needed and most people no longer care that someone can hack their Facebook accounts to see what you said in the emails.
security community "old school". These people supposedly lived when
dinosaurs roamed the Earth, when firewalls were a novelty and
intrusion detection unheard of and TCP port 80 was referred to as
"this new web thing. :-)
The book starts with an unusually exciting section on "security
truisms", timeless principles that allowed the first edition (1994)
to survive until the present time as a useful security book. The
principles will come handy for both hardened security pros (as review)
and complete beginners (as a required mindset). "Keep it simple",
"there is no absolute security", "defense in depth", "fix the
weakest link" and many others still form the philosophical skeleton
of modern security. In the same initial section, the ever-present
mystery of a security policy is covered in a clear and comprehensive
Many other great ideas (some of which are starting to be forgotten
such as "firewall is a gate, not a wall") are found in a book. For
example, the benefits and pitfalls of crypto are also analyzed.
An interesting argument is provided on how graphical interfaces (GUIs)
actually measurably decrease firewall security. While some might think
that "easy to use equals more likely to be used right", authors hold
a different opinion.
While much of the content is timeless, the book is fully up to date
with material on DoS (and DDoS) attacks, VPNs and web security. Even
the debates on hiring hackers and eternal patching cycles find their
place in the book insets.
Firewalls are present in the book title, thus they get all the
deserved coverage with many examples of practical firewall
configuration (Linux, BSD). Linux ipchains coverage is a bit dated,
but can be used for the most part for the modern iptables
configuration as well. IDS are only mentioned, since the authors
apparently don't like them that much.
The book is understandably focused on defense. However, some novel
(are they really - surely authors have a reference somewhere to a 1985
paper where they were first covered? :-) ) attacks on routing are
discussed. Honeypots (in the form of a classic "An Evening with
Berferd" paper updated with more analysis) are also discussed. A
couple more fun incident cases (such as "The Taking of Clark" where
an unknown attacker had a point at getting through to one of the
authors) are also presented.
It does inherit the properties of the first edition (now freely
available) and have everything to look forward to the long and
successful future. The book is strongly recommended for any security
The book also boasts many amazing references to security
resources. What made some of them surprising is their age. How about a
paper on limitation of password authentication - from 1984?
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major
information security company. His areas of infosec expertise include
intrusion detection, UNIX security, forensics, honeypots, etc. In his
spare time, he maintains his security portal info-secure.org
Most recent customer reviews
primary focus. Nor does it try to cover the entire field of
Internet security, although it does provide a...Read more
If you want information from the authoritative sources, this is the book to get.
If you can tolerate the anti-Microsoft aspect, read on!
here I'm speaking for myself.Read more