Building Internet Firewalls, Paperback by Zwicky, Elizabeth D.; Cooper, Simon...

MongrelDotCom
(120)
Registrato come venditore privato
Non si applicano i diritti dei consumatori derivanti dalla normativa europea. La Garanzia cliente eBay è comunque applicabile alla maggior parte degli acquisti. Ulteriori informazioni
US $10,00
CircaEUR 8,65
Condizione:
Accettabile
Goditi i vantaggi. Restituzioni accettate.
Spedizione:
US $9,74 (circa EUR 8,42) USPS Ground Advantage®.
Oggetto che si trova a: Alexandria, Virginia, Stati Uniti
Consegna:
Consegna prevista tra il lun 17 nov e il gio 20 nov a 94104
Le date di consegna stimate - viene aperta una nuova finestra o scheda includono tempi di imballaggio, CAP di origine, CAP di destinazione e periodo di accettazione e dipendono dal servizio di spedizione selezionato e dalla ricezione del pagamentoricezione del pagamento - si apre in una nuova finestra o scheda. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 14 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Scopri di piùGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:205836694484

Specifiche dell'oggetto

Condizione
Accettabile: Libro con evidenti segni di usura. Può avere alcuni danni alla copertina, senza che ...
Book Title
Building Internet Firewalls
ISBN
9781565928718
Categoria

Informazioni su questo prodotto

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1565928717
ISBN-13
9781565928718
eBay Product ID (ePID)
1680057

Product Key Features

Number of Pages
894 Pages
Language
English
Publication Name
Building Internet Firewalls : Internet and Web Security
Subject
Security / Online Safety & Privacy, General, Security / Networking
Publication Year
2000
Type
Textbook
Author
Simon Cooper, D. Brent Chapman, Elizabeth D. Zwicky
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
1.8 in
Item Weight
53.3 Oz
Item Length
9.3 in
Item Width
7.6 in

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
00-039954
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface Part I: Network Security Chapter 1: Why Internet Firewalls? Chapter 2: Internet Services Chapter 3: Security Strategies Part II: Building Firewalls Chapter 4: Packets and Protocols Chapter 5: Firewall Technologies Chapter 6: Firewall Architectures Chapter 7: Firewall Design Chapter 8: Packet Filtering Chapter 9: Proxy Systems Chapter 10: Bastion Hosts Chapter 11: Unix and Linux Bastion Hosts Chapter 12: Windows NT and Windows 2000 Bastion Hosts Part III: Internet Services Chapter 13: Internet Services and Firewalls Chapter 14: Intermediary Protocols Chapter 15: The World Wide Web Chapter 16: Electronic Mail and News Chapter 17: File Transfer, File Sharing, and Printing Chapter 18: Remote Access to Hosts Chapter 19: Real-Time Conferencing Services Chapter 20: Naming and Directory Services Chapter 21: Authentication and Auditing Services Chapter 22: Administrative Services Chapter 23: Databases and Games Chapter 24: Two Sample Firewalls Part IV: Keeping Your Site Secure Chapter 25: Security Policies Chapter 26: Maintaining Firewalls Chapter 27: Responding to Security Incidents Part V: Appendixes Appendix A: Resources Appendix B: Tools Appendix C: Cryptography Colophon
Synopsis
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, "Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.
LC Classification Number
TK5105.59.Z85 2000

Descrizione dell'oggetto fatta dal venditore

Informazioni su questo venditore

MongrelDotCom

98,5% di Feedback positivi176 oggetti venduti

Su eBay da mar 1999
In genere risponde entro 24 ore
Registrato come venditore privatoPertanto non si applicano i diritti dei consumatori derivanti dalla normativa europea. La Garanzia cliente eBay è comunque applicabile alla maggior parte degli acquisti. Scopri di piùScopri di più
Ready to find something special? Discover your next unique treasure at MongrelDotCom! We cater to every passion, whether you're a passionate collector, a serious gamer, a music lover, or a business ...
Mostra altro

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
4.7
Spese spedizione
4.8
Tempi di spedizione
5.0
Comunicazione
5.0

Feedback sul venditore (85)

Tutti i punteggiselected
Positivo
Neutro
Negativo
  • s***s (1151)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    I've been on ebay 27 years and this was one of my top five buying experiences. The seller answered numerous questions quickly, sent extra photographs, accepted my offer, and shipped the robots quickly and very securely in large amounts of bubble wrap. I cannot think of enough adjectives to describe this wonderful seller! Thanks so much for everything.
  • e***t (440)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Yamaha NS-6490 3 Way Bookshelf Speakers - Used - 140 Watts matches listing description. Fair price. Pro ebay shipper. A++++!!!
  • a***l (215)- Feedback lasciato dall'acquirente.
    Ultimo anno
    Acquisto verificato
    Item arrived securely packaged, shipped at a fair price and it arrived a day earlier than anticipated! Seller worked through a mix-up with me, and was professional and friendly throughout the process. Thank you for a good transaction.