Linux Firewalls
Seiten
1999
Prentice-Hall (Verlag)
978-0-7357-0900-3 (ISBN)
Prentice-Hall (Verlag)
978-0-7357-0900-3 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Provides a hands-on description of the need for security measures and solutions to Internet security issues for knowledgeable Linux users. The goal of the text is to help people get their Internet security measures in place without the need to become an expert in security or firewalls.
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a small non-enterprise business user might take to protect themselves when dealing with what the attacker may gain and what a victim may lose. These steps include packet-level firewall filtering, IP masquerading, proxies, tcp wrappers, system integrity checking, and system security monitoring with an overall emphasis on filtering and protection. This book will provide a description of the need for security measures and solutions. The goal is to help people get their Internet security measures in place quickly, without the need to become an expert in security or firewalls.
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a small non-enterprise business user might take to protect themselves when dealing with what the attacker may gain and what a victim may lose. These steps include packet-level firewall filtering, IP masquerading, proxies, tcp wrappers, system integrity checking, and system security monitoring with an overall emphasis on filtering and protection. This book will provide a description of the need for security measures and solutions. The goal is to help people get their Internet security measures in place quickly, without the need to become an expert in security or firewalls.
1. Preliminary Concepts Underlying Packet-Filtering Firewalls.
2. Packet-Filtering Concepts.
3. Building and Installing a Firewall.
4. LAN Issues, Multiple Firewalls, and Perimeter Networks.
5. Debugging the Firewall Rules.
6. Verifying that the System Is Running as You Expect.
7. Issues At the UNIX System Administration Level.
8. Intrusion Detection and Incident Reporting.
Erscheint lt. Verlag | 30.11.1999 |
---|---|
Verlagsort | Harlow |
Sprache | englisch |
Maße | 178 x 228 mm |
Gewicht | 758 g |
Themenwelt | Informatik ► Betriebssysteme / Server ► Unix / Linux |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7357-0900-9 / 0735709009 |
ISBN-13 | 978-0-7357-0900-3 / 9780735709003 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich