Building Internet Firewalls
Overview
A D V E R T I S E M E N T
Completely revised and much expanded, this second edition of the highly
respected and bestselling Building Internet Firewalls now covers Unix, Linux,
and Windows NT. It's a practical and detailed guide which provides step-by-step
explanations of how to design and install firewalls, and how to configure
Internet services to work with a firewall. It covers a wide range of services
and protocols (e.g., SMTP, FTP, DNS, Telnet, JavaScript, ActiveX, NetBT, SMB,
Kerberos, CORBA, IIOP, ODBC, JDBC, and dozens more). It also contains a complete
list of resources, including the location of many publicly available firewalls
construction tools.
Description
In the five years since the first edition of this classic book was published,
Internet use has exploded, and e-commerce has become a daily part of business
and personal life. The commercial world has rushed headlong into doing business
on the Web, often without integrating sound security technologies and policies
into their products and methods. The security risks -- and the need to protect
both business and personal data -- have never been greater.
What kinds of security threats are posed by the Internet? Some, like password
attacks and the exploiting of known security holes, have been around since the
early days of networking. Others, like password sniffers, IP forgery, and
various types of hijacking and replay attacks, are newer. And still others, like
the distributed denial of service attacks that crippled Yahoo, E-Bay, and other
major e-commerce sites in early 2000, come from today's headlines.
Firewalls are a very effective way to protect your system from most Internet
security threats and are a critical component of today's computer networks.
Firewalls in networks keep damage on one part of the network (e.g.,
eavesdropping, a worm program, file damage) from spreading to the rest of the
network. Without firewalls, network security problems can rage out of control,
dragging more and more systems down.
Like the first edition of the highly respected and bestselling Building
Internet Firewalls, the second edition is a practical and detailed guide to
building firewalls on the Internet. It provides step-by-step explanations of how
to design and install firewalls, and how to configure Internet services to work
with a firewall. The second edition is much expanded. It covers Linux and
Windows NT, as well as Unix platforms. It describes a variety of firewall
technologies (packet filtering, proxying, network address translation, virtual
private networks) and architectures (e.g., screening routers, dual-homed hosts,
screened hosts, screened subnets, perimeter networks, internal firewalls). It
also contains a new set of chapters describing the issues involved in a variety
of new Internet services and protocols through a firewall. It covers email and
News; Web services and scripting languages (e.g., HTTP, Java, JavaScript,
ActiveX, RealAudio, RealVideo); file transfer and sharing services (e.g., NFS,
Samba); remote access services (e.g., Telnet, the BSD "r" commands, SSH,
BackOrifice 2000); real-time conferencing services (e.g., ICQ, talk); naming and
directory services (e.g., DNS, NetBT, the Windows Browser); authentication and
auditing services (e.g., PAM, Kerberos, RADIUS); administrative services (e.g.,
syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network
diagnostics); intermediary protocols (e.g., RPC, SMB, CORBA, IIOP); and database
protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL
Server).
The book also contains a complete list of resources, including the location
of many publicly available firewall construction tools.
|