logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Building Internet Firewalls

Building Internet Firewalls (Paperback, 2)

Elizabeth D. Zwicky, Simon Cooper (지은이)
OReilly
103,480원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
84,850원 -18% 0원
4,250원
80,600원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Building Internet Firewalls
eBook 미리보기

책 정보

· 제목 : Building Internet Firewalls (Paperback, 2) 
· 분류 : 외국도서 > 컴퓨터 > 인터넷 > 보안
· ISBN : 9781565928718
· 쪽수 : 896쪽
· 출판일 : 2000-08-01

목차

Preface
I. Network Security

1. Why Internet Firewalls?
What Are You Trying to Protect?
What Are You Trying to Protect Against?
Who Do You Trust?
How Can You Protect Your Site?
What Is an Internet Firewall?
Religious Arguments

2. Internet Services
Secure Services and Safe Services
The World Wide Web
Electronic Mail and News
File Transfer, File Sharing, and Printing
Remote Access
Real-Time Conferencing Services
Naming and Directory Services
Authentication and Auditing Services
Administrative Services
Databases
Games

3. Security Strategies
Least Privilege
Defense in Depth
Choke Point
Weakest Link
Fail-Safe Stance
Universal Participation
Diversity of Defense
Simplicity
Security Through Obscurity

II. Building Firewalls

4. Packets and Protocols
What Does a Packet Look Like?
IP
Protocols Above IP
Protocols Below IP
Application Layer Protocols
IP Version 6
Non-IP Protocols
Attacks Based on Low-Level Protocol Details

5. Firewall Technologies
Some Firewall Definitions
Packet Filtering
Proxy Services
Network Address Translation
Virtual Private Networks

6. Firewall Architectures
Single-Box Architectures
Screened Host Architectures
Screened Subnet Architectures
Architectures with Multiple Screened Subnets
Variations on Firewall Architectures
Terminal Servers and Modem Pools
Internal Firewalls

7. Firewall Design
Define Your Needs
Evaluate the Available Products
Put Everything Together

8. Packet Filtering
What Can You Do with Packet Filtering?
Configuring a Packet Filtering Router
What Does the Router Do with Packets?
Packet Filtering Tips and Tricks
Conventions for Packet Filtering Rules
Filtering by Address
Filtering by Service
Choosing a Packet Filtering Router
Packet Filtering Implementations for General-Purpose Computers
Where to Do Packet Filtering
What Rules Should You Use?
Putting It All Together

9. Proxy Systems
Why Proxying?
How Proxying Works
Proxy Server Terminology
Proxying Without a Proxy Server
Using SOCKS for Proxying
Using the TIS Internet Firewall Toolkit for Proxying
Using Microsoft Proxy Server
What If You Can't Proxy?

10. Bastion Hosts
General Principles
Special Kinds of Bastion Hosts
Choosing a Machine
Choosing a Physical Location
Locating Bastion Hosts on the Network
Selecting Services Provided by a Bastion Host
Disabling User Accounts on Bastion Hosts
Building a Bastion Host
Securing the Machine
Disabling Nonrequired Services
Operating the Bastion Host
Protecting the Machine and Backups

11. Unix and Linux Bastion Hosts
Which Version of Unix?
Securing Unix
Disabling Nonrequired Services
Installing and Modifying Services
Reconfiguring for Production
Running a Security Audit

12. Windows NT and Windows 2000 Bastion Hosts
Approaches to Building Windows NT Bastion Hosts
Which Version of Windows NT?
Securing Windows NT
Disabling Nonrequired Services
Installing and Modifying Services

III. Internet Services

13. Internet Services and Firewalls
Attacks Against Internet Services
Evaluating the Risks of a Service
Analyzing Other Protocols
What Makes a Good Firewalled Service?
Choosing Security-Critical Programs
Controlling Unsafe Configurations

14. Intermediary Protocols
Remote Procedure Call (RPC)
Distributed Component Object Model (DCOM)
NetBIOS over TCP/IP (NetBT)
Common Internet File System (CIFS) and Server Message Block (SMB)
Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP)
ToolTalk
Transport Layer Security (TLS) and Secure Socket Layer (SSL)
The Generic Security Services API (GSSAPI)
IPsec
Remote Access Service (RAS)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Transport Protocol (L2TP)

15. The World Wide Web
HTTP Server Security
HTTP Client Security
HTTP
Mobile Code and Web-Related Languages
Cache Communication Protocols
Push Technologies
RealAudio and RealVideo
Gopher and WAIS

16. Electronic Mail and News
Electronic Mail
Simple Mail Transfer Protocol (SMTP)
Other Mail Transfer Protocols
Microsoft Exchange
Lotus Notes and Domino
Post Office Protocol (POP)
Internet Message Access Protocol (IMAP)
Microsoft Messaging API (MAPI)
Network News Transfer Protocol (NNTP)

17. File Transfer, File Sharing, and Printing
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Network File System (NFS)
File Sharing for Microsoft Networks
Summary of Recommendations for File Sharing
Printing Protocols
Related Protocols

18. Remote Access to Hosts
Terminal Access (Telnet)
Remote Command Execution
Remote Graphical Interfaces

19. Real-Time Conferencing Services
Internet Relay Chat (IRC)
ICQ
talk
Multimedia Protocols
NetMeeting
Multicast and the Multicast Backbone (MBONE)

20. Naming and Directory Services
Domain Name System (DNS)
Network Information Service (NIS)
NetBIOS for TCP/IP Name Service and Windows Internet Name Service
The Windows Browser
Lightweight Directory Access Protocol (LDAP)
Active Directory
Information Lookup Services

21. Authentication and Auditing Services
What Is Authentication?
Passwords
Authentication Mechanisms
Modular Authentication for Unix
Kerberos
NTLM Domains
Remote Authentication Dial-in User Service (RADIUS)
TACACS and Friends
Auth and identd

22. Administrative Services
System Management Protocols
Routing Protocols
Protocols for Booting and Boot-Time Configuration
ICMP and Network Diagnostics
Network Time Protocol (NTP)
File Synchronization
Mostly Harmless Protocols

23. Databases and Games
Databases
Games

24. Two Sample Firewalls
Screened Subnet Architecture
Merged Routers and Bastion Host Using General-Purpose Hardware

IV. Keeping Your Site Secure

25. Security Policies
Your Security Policy
Putting Together a Security Policy
Getting Strategic and Policy Decisions Made
What If You Can't Get a Security Policy?

26. Maintaining Firewalls
Housekeeping
Monitoring Your System
Keeping up to Date
How Long Does It Take?
When Should You Start Over?

27. Responding to Security Incidents
Responding to an Incident
What to Do After an Incident
Pursuing and Capturing the Intruder
Planning Your Response
Being Prepared

V. Appendixes

A. Resources

B. Tools

C. Cryptography

Index

저자소개

Elizabeth D. Zwicky (지은이)    정보 더보기
실리콘그래픽스(SGI)의 고참 시스템 관리자이며, SAGE(System Administrators Guild)의 의장이다. 10년 동안 대형 유닉스 시스템 관리 업무를 해오고 있으며, SAGE와 BayLISA(샌 프란시스코만 지역의 시스템 관리자 그룹)의 창립 이사를 역임했으며, 오스트레일리아 시스템 관리 그룹인 SAGE-AU의 첫번째 이사회의 의결권 없는 이사를 맡은 적도 있다. 인터넷 웜이 나오기 전부터 인터넷 보안에 자발적으로 참여해 왔다. 한편 매번 다르게 프린트되는 포스트스크립트 문서를 만들어내는 포스트스크립트의 'rand' 기능을 아주 잘 사용하는 몇 안되는 전문가이다.
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책