Firewalls and Internet security : repelling the wily hacker
著者
書誌事項
Firewalls and Internet security : repelling the wily hacker
(Addison-Wesley professional computing series)
Addison-Wesley, c1994
大学図書館所蔵 全38件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Bibliography: p. 257-276
Includes index
内容説明・目次
内容説明
Written by two AT&T Bell Labs researchers who helped break the infamous "Berferd" hacker case, this book gives you invaluable advice and practical tools for protecting your organization's computers from the very real threat of a hacker attack through the Internet. The authors show you step-by-step how to set up a firewall gateway-a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection.
目次
Preface.
I. GETTING STARTED.
1. Introduction.
Why Security?
Picking a Security Policy.
Strategies for a Secure Network.
The Ethics of Computer Security.
WARNING.
2. An Overview of TCP/IP.
The Different Layers.
Routers and Routing Protocols.
The Domain Name System.
Standard Services.
RPC.
based Protocols.
File Transfer Protocols.
The "r" Commands.
Information Services.
The X11 System.
Patterns of Trust.
II. BUILDING YOUR OWN FIREWALL.
3. Firewall Gateways.
Firewall Philosophy.
Situating Firewalls.
Packet-Filtering Gateways.
Application-Level Gateways.
Circuit-Level Gateways.
Supporting Inbound Services.
Tunnels Good and Bad.
Joint Ventures.
What Firewalls Can't Do.
4. How to Build an Application-Level Gateway.
Policy.
Hardware Configuration Options.
Initial Installation.
Gateway Tools.
Installing Services.
Protecting the Protectors.
Gateway Administration.
Safety Analysis (Why Our Setup Is Secure and Fail-Safe).
Performance.
The TIS Firewall Toolkit.
Evaluating Firewalls.
Living Without a Firewall.
5. Authentication.
User Authentication.
Host-to-Host Authentication.
6. Gateway Tools.
Proxylib.
Syslog.
Watching the Network: Tcpdump and Friends.
Adding Logging to Standard Daemons.
7. Traps, Lures, and Honey Pots.
What to Log.
Dummy Accounts.
Tracing the Connection.
8. The Hacker's Workbench.
Introduction.
Discovery.
Probing Hosts.
Connection Tools.
Routing Games.
Network Monitors.
Metastasis.
Tiger Teams.
Further Reading.
III. A BOOK BACK.
9. Classes of Attacks.
Stealing Passwords.
Social Engineering.
Bugs and Backdoors.
Authentication Failures.
Protocol Failures.
Information Leakage.
Denial-of-Service.
10. An Evening with Berferd.
Introduction.
Unfriendly Acts.
An Evening with Berferd.
The Day After.
The Jail.
Tracing Berferd.
Berferd Comes Home.
11. Where the Wild Things Are: A Look at the Logs.
A Year of Hacking.
Proxy Use.
Attack Sources.
Noise on the Line.
IV. ODDS AND ENDS.
12. Legal Considerations.
Computer Crime Statutes.
Log Files as Evidence.
Is Monitoring Legal?
Tort Liability Considerations.
13. Secure Communications over Insecure Networks.
An Introduction to Cryptography.
The Kerberos Authentication System.
Link-Level Encryption.
Network- and Transport-Level Encryption.
Application-Level Encryption.
14. Where Do We Go from Here?
Appendix A. Useful Free Stuff.
Building Firewalls.
Network Management and Monitoring Tools.
Auditing Packages.
Cryptographic Software.
Information Sources.
Appendix B. TCP and UDP Ports.
Fixed Ports.
MBone Usage.
Appendix C. Recommendations to Vendors.
Everyone.
Hosts.
Routers.
Protocols.
Firewalls.
Bibliography.
List of Bombs.
Index. 0201633574T04062001
「Nielsen BookData」 より