AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Firewalls and Internet Security: Repelling The Wily Hacker (Addison-Wesley Professional Computing)

par William R. Cheswick, Steven M. Bellovin (Auteur)

Autres auteurs: Voir la section autres auteur(e)s.

MembresCritiquesPopularitéÉvaluation moyenneDiscussions
2612102,072 (3.92)Aucun
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses in the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers will learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion. The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and describes the tools and techniques used to perpetrate--and prevent--such attacks. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through a critical examination of problems and practices on today's intranets, as well as discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions about the future of firewalls and Internet security. The book's appendixes provide an introduction to cryptography and a list of resources (also posted to the book's Web site) that readers can rely on for tracking further security developments. Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make security decisions that will make the Internet--and their computers--safer. 020163466XB01302003… (plus d'informations)
Aucun
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

2 sur 2
Excellent primer on firewalls. ( )
  njtrout | Aug 17, 2009 |
Highly technical book, naturally, that deals with setting up a secure computer or network. Clear and useful. Particularly interesting for the account of extended attacks on AT&T's system during the first Gulf War. ( )
  BrentNewhall | May 12, 2008 |
2 sur 2
aucune critique | ajouter une critique

» Ajouter d'autres auteur(e)s

Nom de l'auteurRôleType d'auteurŒuvre ?Statut
William R. Cheswickauteur principaltoutes les éditionscalculé
Bellovin, Steven M.Auteurauteur principaltoutes les éditionsconfirmé
Rubin, Aviel D.auteur principalquelques éditionsconfirmé
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Lieux importants
Évènements importants
Films connexes
Épigraphe
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
"But after a time, as Frodo did not show any sign of writing a book on the spot, the hobbits returned to their question about doings in the Shire." Lord of the Rings, J.R.R. Tolkien
Dédicace
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
For my mother, Ruth Cheswick, whose maiden name shall not be revealed because this is a security book, and for my father Richard Reid Cheswick, who taught me about Monday mornings, and many other things. And to Terry, Kestrel and Lorrett, who had to put up with lenghty spates of grumpy editing sessions. W.R.C.

To my parents, Sam and Sylvia Bellovin, for everything and to Diane, Rebecca, and Daniel, for all the best reasons in the world. S.M.B.

To my wife, Ann, my favorite person in the world; and to my children, Elana, Tamara, and Benny, the three best things that ever happened to me. A.D.R.
Premiers mots
Citations
Derniers mots
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Langue d'origine
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais (3)

The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses in the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers will learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion. The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and describes the tools and techniques used to perpetrate--and prevent--such attacks. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through a critical examination of problems and practices on today's intranets, as well as discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions about the future of firewalls and Internet security. The book's appendixes provide an introduction to cryptography and a list of resources (also posted to the book's Web site) that readers can rely on for tracking further security developments. Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make security decisions that will make the Internet--and their computers--safer. 020163466XB01302003

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: (3.92)
0.5
1
1.5
2 2
2.5
3 5
3.5 2
4 8
4.5
5 8

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 204,674,660 livres! | Barre supérieure: Toujours visible