防火墻技術(shù)指南

出版時(shí)間:2001-4  出版社:世界圖書出版公司北京  作者:(美)Marcus Goncalves  頁(yè)數(shù):678  
Tag標(biāo)簽:無(wú)  

內(nèi)容概要

This book is aimed primarily at network, Web, systems, LAN, and WAN administrators. But it is also targeted at the new breed of professionals, the so-called Internet Managers, as well as to anyone in need of a complete reference book on firewalls. As you read this book, you will notice that what separates it from the others is that this book is comprehensive and gives the technical information necessary to understand, choose, install, maintain, and foresee future needs involving firewalls and security at a very informal level. It has a conversational style with practical information, tips, and cautions to help the Internet, network, and security administrator to cope, and "survive" their tasks and responsibilities.

書籍目錄

Preface.AcknowledgmentsPart I Introducing TCP/IP and the Need for Security: Firewalls  Chapter 1 Internetworking Protocols and Standards: An Overview    Internet Protocol (IP)    User Oatagram Protocol (UDP)    Transmission Control Protocol (TCP)    Extending IP Addresses Through CIDR    Routing Information Protocol (RIP)    MBONE-The Multicast Backbone    Internet Control Message Protocol (ICMP)    Internet Group Management Protocol (IGMP)    Open Shortest-Path First (OSPF)    Border Gateway Protocol Version 4 (BGP-4)    Address Resolution Protocol    Simple Network Management Protocol (SNMP)    Watch Your ISP Connection    The Internet Protocol Next Generation or IPv6    Network Time Protocol (NTP)    Dynamic Host Configuration Protocol (DHCP)    Windows Sockets    Domain Name System(DNS)    Firewalls Concepts  Chapter 2   Basic Connectivity    What Happened to      What Is the Baudot Code?    UNIX to UNIX CoPy (UUCP)    SLIP and PPP    Rlogin    Virtual Terminal Protocol (Telnet)       Columbia University's Kermit: A Secure and Reliable        Telnet Server      Telnet Services Security Considerations      A Systems Manager Approach to Network Security      Telnet Session Security Checklist    Trivial File Transfer Protocol (TFTP)      TFTP Security Considerations    File Transfer Protocol (FTP)    Some of the Challenges of Using Firewalls    Increasing Security on IP Networks  Chapter 3   Cryptography: Is It Enough?    Introduction    Symmetric Key Encryption (Private Keys)      Data Encryption Standard (DES)      International Data Encryption Algorithm (IDEA)      CAST      Skipjack      RC2/RC4    Asymmetric Key Encryption/Public Key Encryption      RSA      Digital Signature Standard (DSS)    Message Digest Algorithms      MD2, MD4, and MD5      Secure Hash Standard/Secure Hash Algorithm      (SHS/SHA)    Certificates      Certificate Servers    Key Management      Kerberos      Key-Exchange Algorithms (KEA)    …… Chapter 4 Firewalling Challenges:The Basic Web   Chapter 5 Firewalling Challenges:The Advanced Web   Chapter 6 The API's Security Holes and its FirewallPart 2 Firewall Implementations and Limitations  Chapter 7 What is an Internet/Intranet Firewall After All?  Chapter 8 How Vulnerable Are Internet Services?  Chapter 9 Setting Up a Firewall Security Policy  Chapter 10 Putting It Together:Firewall Design and Implementation  Chapter 11 proxy Servers  Chapter 12 Firewall Maintenance   Chapter 13 Firewall Toolkits and Case Studies Part 3 Firewall Resource Guide  Chapter 14 Types of Firewalls and Products on the MarketAppendix A List of Firewall Resellers and Related Tools Glossary Bibliography Index

圖書封面

圖書標(biāo)簽Tags

無(wú)

評(píng)論、評(píng)分、閱讀與下載


    防火墻技術(shù)指南 PDF格式下載


用戶評(píng)論 (總計(jì)0條)

 
 

 

250萬(wàn)本中文圖書簡(jiǎn)介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號(hào)-7