買這商品的人也買了...
-
$520$343 -
$580$493 -
$980$833 -
$970Introduction to Algorithms, 2/e
-
$580$493 -
$1,150$1,127 -
$700Microsoft Visual Basic .NET Step by Step
-
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$720$612 -
$1,620Practical Unix & Internet Security, 3/e (Paperback)
-
$590$466 -
$690$538 -
$780$663 -
$580$493 -
$750$638 -
$590$460 -
$560$476 -
$880$695 -
$480$379 -
$750$638 -
$780$616 -
$880$695 -
$2,300$2,185 -
$1,800$1,710
相關主題
商品描述
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.
What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.
Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:
-
- Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
- Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
- Issues involved in a variety of new Internet services and protocols through a firewall
- Email and News
- Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
- File transfer and sharing services such as NFS, Samba
- Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
- Real-time conferencing services such as ICQ and talk
- Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
- Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
- Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
- Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
- Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)
- The book's complete list of resources includes the location of many publicly available firewall construction tools.
商品描述(中文翻譯)
在這本經典書籍的第一版出版的五年以來,網際網路的使用量激增。商業界急速投入網路商務,往往未能將健全的安全技術和政策整合到他們的產品和方法中。安全風險——以及保護商業和個人數據的需求——從未如此之高。我們已更新《建立網際網路防火牆》(Building Internet Firewalls)以應對這些新風險。
網際網路帶來了哪些類型的安全威脅?一些威脅,如密碼攻擊和利用已知安全漏洞,從網路早期就已存在。而其他威脅,如在2000年初使Yahoo、E-Bay及其他主要電子商務網站癱瘓的分散式拒絕服務攻擊,則是當前的頭條新聞。
防火牆是當今計算機網路的關鍵組件,有效地保護系統免受大多數網際網路安全威脅。它們防止網路中某一部分的損害——例如竊聽、蠕蟲程序或文件損壞——擴散到整個網路。沒有防火牆,網路安全問題可能失控,導致越來越多的系統受到影響。
與暢銷且備受尊敬的第一版相似,《建立網際網路防火牆》(Building Internet Firewalls)第二版是一本實用且詳細的逐步指南,介紹如何設計和安裝防火牆,以及如何配置網際網路服務以與防火牆協同工作。第二版大幅擴展,涵蓋了Linux和Windows,描述了:
- 防火牆技術:封包過濾、代理、網路地址轉換、虛擬私人網路
- 架構,如篩選路由器、雙網路主機、篩選主機、篩選子網、邊界網路、內部防火牆
- 通過防火牆涉及的各種新網際網路服務和協議的問題
- 電子郵件和新聞
- 網路服務和腳本語言(例如,HTTP、Java、JavaScript、ActiveX、RealAudio、RealVideo)
- 文件傳輸和共享服務,如NFS、Samba
- 遠端存取服務,如Telnet、BSD的“r”命令、SSH、BackOrifice 2000
- 實時會議服務,如ICQ和talk
- 命名和目錄服務(例如,DNS、NetBT、Windows瀏覽器)
- 認證和審計服務(例如,PAM、Kerberos、RADIUS)
- 管理服務(例如,syslog、SNMP、SMS、RIP及其他路由協議,以及ping和其他網路診斷)
- 中介協議(例如,RPC、SMB、CORBA、IIOP)
- 數據庫協議(例如,ODBC、JDBC,以及Oracle、Sybase和Microsoft SQL Server的協議)
本書的完整資源列表包括許多公開可用的防火牆建設工具的位置。