Building Internet firewalls = 构建Internet防火墙 / 第2版.

副标题:无

作   者:Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman.

分类号:

ISBN:9787302065548

微信扫一扫,移动浏览光盘

简介

   [font color="#ff6600"]“我曾在1991年说过你需要从11页纸的《practical unix security》》中去了解防火墙。时过境迁,现在需要了解更多防火墙的知识。本书严谨地、完整地介绍了防火墙的所有知识,并且循序渐进地解释了防火墙的应用方式。如果你是在使用网络,那么你就不能离了这本书。”--gene spafford教授(普度大学信息安全教育与研究中心) [/font]    [font color="#ff6600"]“设计一个安全的网络比网络部署之后再去纠正错误总是要更简单些。这本书介绍了防火墙的基础原理,并详细介绍了正确设计网络所需要的信息。这本书对于任何想安全地操作网络的人来说,都是一本不可缺少的参考书。”--david leblanc(微软公司itg信息安全公司主管技术官)[/font]    [font color="#ff6600"]“这简直包含了防火墙的所有内容!管理、危机、常规安全、防御设计、策略、检测、反击等等,这 本书包含了高效地实现和维护一个实用防火墙所需要的所有知识。”--greg rose(qualcomm公司高级工程师)[/font]    从这本经典参考书的第一版出版以来,internet经历了爆炸式的增长,而电子商务也成为企业运作和个人生活不可或缺的一部分。随着internet的飞速膨胀,安全方面的危机也在飞速扩大:从密码嗅探到ip欺骗,从篡改网站首页到导致流行站点死机的分布式拒绝服务攻击。 防火墙是保护系统免遭internet安全威胁的一种十分有效的方式,防火墙已经成了当今计算机网络的关键组件。与第一版一样,本书(第二版)也是一本非常实用、非常详细的指南,能够帮助读者设计和构建internet防火墙并将internet服务配置为使用防火墙进行工作。相比上一版,本书在内容上进行了极大的扩展,覆盖windows nt和linux系统,以及unix系统。其中详细地介绍了各种防火墙技术(数据包过滤、代理、网络地址转换、虚拟专用网)和体系结构,以及100多种internet服务,范围从电子邮件和文件传输,到web服务和脚本语言,还有命名方式、认证方式和数据库协议。 本书还用了几章的篇幅专门介绍安全策略、加密方式、防火墙的维护,以及安全事件的应急响应,另外还总结了一些有用的防火墙工具和其他资源。

目录

preface

i network security

1. wiry internet firewalls?

what are you trying to protect?

what are you trying to protect against?

who do you trust?

how can you protect your site?

what is an internet firewall?

religious arguments

2. internet services

secure services and safe services

the world wide web

electronic mail and news

file transfer, file sharing, and printing

remote access

real-time conferencing services

naming and directory services

authentication and auditing services

administrative services

databases

.games

3. security strategies

least privilege

defense in depth

choke point

weakest link

fail-safe stance

universal participation

diversity of defense

simplicity-

security through obscurity

ii building firewalls

4. packets and protocols

what does a packet look like?

ip

protocols above ip

protocols below ip

application layer protocols

ip version 6

non-ip protocols

attacks based on low-level protocol details

5. firewall technologies

some firewall definitions

packet filtering

proxy services

network address translation

virtual private networks

6. firewall architectures

single-box architectures

screened host architectures

screened subnet architectures

architectures with multiple screened subnets

variations on firewall architectures

terminal servers and modem pools

internal firewalls

7. firewall design

define your needs

evaluate the available products

put everything together

8. packet filtering

what can you do with packet filtering?

configuring a packet filtering router

what does the router do with packets?

packet filtering tips and tricks

conventions for packet filtering rules

filtering by address

filtering by service

choosing a packet filtering router

packet filtering implementations for general-purpose computers

where to do packet filtering

what rules should you use?

putting it all together

9. proxy systems

why proxying?

how proxying works

proxy server terminology

proxying without a proxy server

using socks for proxying

using the tis internet firewall toolkit for proxying

using microsoft proxy server

what if you can't proxy?

10. bastion hosts

general principles

special kinds of bastion hosts

choosing a machine

choosing a physical location

locating bastion hosts on the network

selecting services provided by a bastion host

disabling user accounts on bastion hosts

building a bastion host

securing the machine

disabling nonrequired services

operating the bastion host

protecting the machine and backups

11. unix and linux bastion hosts

which version of unix?

securing unix

disabling nonrequired services

installing and modifying services

reconfiguring for production

running a security audit

12. windows nt and windows 2000 bastion hosts

approaches to building windows nt bastion hosts

which version of windows nt?

securing windows nt

disabling nonrequired services

installing and modifying services

iii internet services

13. internet services and firewalls

attacks against internet services

evaluating the risks of a service

analyzing other protocols

what makes a good firewalled service?

choosing security-critical programs

controlling unsafe configurations

14. intermediary protocols

remote procedure call (rpc)

distributed component object model (dcom)

netbios over tcp/ip (netbt)

common internet file system (cifs) and server

message block (smb)

common object request broker architecture (corba)

and internet inter-orb protocol (iiop)

tooltalk

transport layer security (tls) and secure socket layer (ssl)

the generic security services api (gssapi)

ipsec

remote access service (ras)

point-to-point tunneling protocol (pptp)

layer 2 transport protocol (l2tp)

15. the world wide web

http server security

http client security

http

mobile code and web-related languages

cache communication protocols

push technologies

realaudio and realvideo

gopher and wais

16. electronic mail and news

electronic mail

simple mail transfer protocol (smtp)

other mail transfer protocols

microsoft exchange

lotus notes and domino

post office protocol (pop)

internet message access protocol (imap)

microsoft messaging api (mapi)

network news transfer protocol (nntp)

17. file transfer, file sharing, and printing

file transfer protocol (ftp)

trivial file transfer protocol (tftp)

network file system (nfs)

file sharing for microsoft networks

summary of recommendations for file sharing

printing protocols

related protocols

18. remote access to hosts

terminal access (telnet)

remote command execution

remote graphical interfaces

19. real-time conferencing services

internet relay chat (irc)

icq

talk

multimedia protocols

netmeeting

multicast and the multicast backbone (mbone)

20. naming and directory services

domain name system (dns)

network information service (nis)

netbios for tcp/ip name service and windows internet

name service

the windows browser

lightweight directory access protocol (ldap)

active directory

information lookup services

21. authentication and auditing services

what is authentication?

passwords

authentication mechanisms

modular authentication for unix

kerberos

ntlm domains

remote authentication dial-in user service (radius)

tacacs and friends

auth and identd

22. administrative services

system management protocols

routing protocols

protocols for booting and boot-time configuration

icmp and network diagnostics

network time protocol (ntp)

file synchronization

mostly harmless protocols

23. databases and games

databases

games

24. two sample firewalls

screened subnet architecture

merged routers and bastion host using general-purpose hardware

iv. keeping your site secure

25. security policies

your security policy

putting together a security policy

getting strategic and policy decisions made

what if you can't get a security policy?

26. maintaining firewalls

housekeeping

monitoring your system

keeping up to date

how long does it take?

when should you start over?

27. responding to security incidents

responding to an incident

what to do after an incident

pursuing and capturing the intruder

planning your response

being prepared

v. appendixes

a. resources

b. tools

c. cryptography

index


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

Building Internet firewalls = 构建Internet防火墙 / 第2版.
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon