出版時(shí)間:2001-4 出版社:世界圖書出版公司北京 作者:(美)Marcus Goncalves 頁(yè)數(shù):678
Tag標(biāo)簽:無(wú)
內(nèi)容概要
This book is aimed primarily at network, Web, systems, LAN, and WAN administrators. But it is also targeted at the new breed of professionals, the so-called Internet Managers, as well as to anyone in need of a complete reference book on firewalls. As you read this book, you will notice that what separates it from the others is that this book is comprehensive and gives the technical information necessary to understand, choose, install, maintain, and foresee future needs involving firewalls and security at a very informal level. It has a conversational style with practical information, tips, and cautions to help the Internet, network, and security administrator to cope, and "survive" their tasks and responsibilities.
書籍目錄
Preface.AcknowledgmentsPart I Introducing TCP/IP and the Need for Security: Firewalls Chapter 1 Internetworking Protocols and Standards: An Overview Internet Protocol (IP) User Oatagram Protocol (UDP) Transmission Control Protocol (TCP) Extending IP Addresses Through CIDR Routing Information Protocol (RIP) MBONE-The Multicast Backbone Internet Control Message Protocol (ICMP) Internet Group Management Protocol (IGMP) Open Shortest-Path First (OSPF) Border Gateway Protocol Version 4 (BGP-4) Address Resolution Protocol Simple Network Management Protocol (SNMP) Watch Your ISP Connection The Internet Protocol Next Generation or IPv6 Network Time Protocol (NTP) Dynamic Host Configuration Protocol (DHCP) Windows Sockets Domain Name System(DNS) Firewalls Concepts Chapter 2 Basic Connectivity What Happened to What Is the Baudot Code? UNIX to UNIX CoPy (UUCP) SLIP and PPP Rlogin Virtual Terminal Protocol (Telnet) Columbia University's Kermit: A Secure and Reliable Telnet Server Telnet Services Security Considerations A Systems Manager Approach to Network Security Telnet Session Security Checklist Trivial File Transfer Protocol (TFTP) TFTP Security Considerations File Transfer Protocol (FTP) Some of the Challenges of Using Firewalls Increasing Security on IP Networks Chapter 3 Cryptography: Is It Enough? Introduction Symmetric Key Encryption (Private Keys) Data Encryption Standard (DES) International Data Encryption Algorithm (IDEA) CAST Skipjack RC2/RC4 Asymmetric Key Encryption/Public Key Encryption RSA Digital Signature Standard (DSS) Message Digest Algorithms MD2, MD4, and MD5 Secure Hash Standard/Secure Hash Algorithm (SHS/SHA) Certificates Certificate Servers Key Management Kerberos Key-Exchange Algorithms (KEA) …… Chapter 4 Firewalling Challenges:The Basic Web Chapter 5 Firewalling Challenges:The Advanced Web Chapter 6 The API's Security Holes and its FirewallPart 2 Firewall Implementations and Limitations Chapter 7 What is an Internet/Intranet Firewall After All? Chapter 8 How Vulnerable Are Internet Services? Chapter 9 Setting Up a Firewall Security Policy Chapter 10 Putting It Together:Firewall Design and Implementation Chapter 11 proxy Servers Chapter 12 Firewall Maintenance Chapter 13 Firewall Toolkits and Case Studies Part 3 Firewall Resource Guide Chapter 14 Types of Firewalls and Products on the MarketAppendix A List of Firewall Resellers and Related Tools Glossary Bibliography Index
圖書封面
圖書標(biāo)簽Tags
無(wú)
評(píng)論、評(píng)分、閱讀與下載