- Paperback: 464 pages
- Publisher: Addison-Wesley Professional; 2 edition (March 6, 2003)
- Language: English
- ISBN-10: 020163466X
- ISBN-13: 978-0201634662
- Product Dimensions: 7.3 x 1.2 x 9.1 inches
- Shipping Weight: 2.1 pounds (View shipping rates and policies)
- Average Customer Review: 26 customer reviews
- Amazon Best Sellers Rank: #827,509 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition) 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
All Books, All the Time
Read author interviews, book reviews, editors picks, and more at the Amazon Book Review. Read it now
Frequently bought together
Customers who bought this item also bought
Essential information for anyone wanting to protect Internet-connected computers from unauthorized access. Includes:
- thorough discussion of security-related aspects of TCP/IP;
- step-by-step plans for setting up firewalls;
- hacking and monitoring tools the authors have built to rigorously test and maintain firewalls;
- pointers to public domain security tools on the net;
- first-hand step-by-step accounts of battles with the "Berferd" hackers; and
- practical discussions of the legal aspects of security.
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it. In addition, there is vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security. With Firewalls and Internet Security, anyone will be well equipped to provide their organization with effective protection from the wily Internet hacker. -- Midwest Book Review --This text refers to an out of print or unavailable edition of this title.
Top customer reviews
More than a mere book on firewalls, this is a primer for the entire workings of the Internet Protocols. It has clear explanations of DNS, DHCP, TCP, UDP, ICMP, SSL, FTP and many other protocols without all the nitty gritty details that you'll find in a book like "TCP/IP Illustrated." <http://www.amazon.com/TCP-IP-Illustrated-Vol-Protocols/dp/0201633469>, which I recommend if you need more technical detail.
The authors describe the risks associated with the protocols and strategies for protecting your systems. But, they go further, and explain other attacks and how they might circumvent the barriers that a sysadmin might erect.
The exposition on Firewalls and VPNs (Virtual Private Networks) begins in Part IV. There are specific strategies given for protecting several protocols. No specifics on CISCO PIX, sorry guys, the examples use software generally available on Unix (FreeBSD). But, that's mainly a syntax issue, the principles are the same for the large comercial firewall systems. But, once again, if you need specifics, you'll need to read the manuals. This book will give you the foundation to understand what you read in the manuals. Firewall manuals are dry in comparison and generally lack strategic recommendations.
The first appendix does a decent job of explaining public key cryptography. The second appendix is "dated" though in that it attempts to give "links" to other resources. After 7+ years, you can imagine the problems with that.
Likewise the bibliography mainly cites texts from the 1990's; although there is one reference from 1872: "Through the Looking Glass", Lewis Carroll. Typical of the entertaining quotes throughout the book, "When I use a word. . .it means just what I choose it to mean, neither more nor less." And perhaps that's a fitting summary of this book's purpose, to familiarize you with the meanings of the "Carrollesque" words associated with Internet Security.
This book is well done for what it is... a basic outline of why friewalls started to be needed and how come things worked the way they did. It is not too hard for someone that can read english but perhaps not computer gik talk.
The world has moved on and this stuff is of little use to todays computer user... i.e. the big bad KGB has the codes they needed and most people no longer care that someone can hack their Facebook accounts to see what you said in the emails.
Written in clear language, this is a technical book. If you don't know what TCP, UDP, and "application protocol" mean, learn them,and then read this book. The better you understand basic networking and security the more usefull this book is. However don't let me lead you to believe it's not usefull if you don't understand these terms. Read the book, read other books like "Internetworking with TCP/IP Vol. I: Principles, Protocols, and Architecture" by Douglas Comer.
This book happens to be the first Information security I've read, although I've read dozens in the 6 years or so, since I first read this book.
If you consider yourself knowledgeable about information security this is a classic that you need to read. If your in need of network security knowledge this is a great place to start, and it contains great references.
Most recent customer reviews
primary focus. Nor does it try to cover the entire field of
Internet security, although it does provide a...Read more
If you want information from the authoritative sources, this is the book to get.
If you can tolerate the anti-Microsoft aspect, read on!
here I'm speaking for myself.Read more