注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全防火墙技术指南(英文版)

防火墙技术指南(英文版)

防火墙技术指南(英文版)

定 价:¥105.00

作 者: M.Goncalves 著
出版社: 世界图书出版公司
丛编项:
标 签: 信息安全

购买这本书可以去


ISBN: 9787506249713 出版时间: 2001-04-01 包装: 平装
开本: 大32开 页数: 678 字数:  

内容简介

  This book is aimed primarily at network, Web, systems, LAN, and WAN administrators. But it is also targeted at the new breed of professionals, the so-called Internet Managers, as well as to anyone in need of a complete reference book on firewalls. As you read this book, you will notice that what separates it from the others is that this book is comprehensive and gives the technical information necessary to understand, choose, install, maintain, and foresee future needs involving firewalls and security at a very informal level. It has a conversational style with practical information, tips, and cautions to help the Internet, network, and security administrator to cope, and "survive" their tasks and responsibilities.

作者简介

暂缺《防火墙技术指南(英文版)》作者简介

图书目录

Preface.
Acknowledgments
Part I Introducing TCP/IP and the Need for Security: Firewalls
Chapter 1 Internetworking Protocols and Standards: An Overview
Internet Protocol (IP)
User Oatagram Protocol (UDP)
Transmission Control Protocol (TCP)
Extending IP Addresses Through CIDR
Routing Information Protocol (RIP)
MBONE-The Multicast Backbone
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Open Shortest-Path First (OSPF)
Border Gateway Protocol Version 4 (BGP-4)
Address Resolution Protocol
Simple Network Management Protocol (SNMP)
Watch Your ISP Connection
The Internet Protocol Next Generation or IPv6
Network Time Protocol (NTP)
Dynamic Host Configuration Protocol (DHCP)
Windows Sockets
Domain Name System(DNS)
Firewalls Concepts
Chapter 2 Basic Connectivity
What Happened to
What Is the Baudot Code?
UNIX to UNIX CoPy (UUCP)
SLIP and PPP
Rlogin
Virtual Terminal Protocol (Telnet)
Columbia University's Kermit: A Secure and Reliable
Telnet Server
Telnet Services Security Considerations
A Systems Manager Approach to Network Security
Telnet Session Security Checklist
Trivial File Transfer Protocol (TFTP)
TFTP Security Considerations
File Transfer Protocol (FTP)
Some of the Challenges of Using Firewalls
Increasing Security on IP Networks
Chapter 3 Cryptography: Is It Enough?
Introduction
Symmetric Key Encryption (Private Keys)
Data Encryption Standard (DES)
International Data Encryption Algorithm (IDEA)
CAST
Skipjack
RC2/RC4
Asymmetric Key Encryption/Public Key Encryption
RSA
Digital Signature Standard (DSS)
Message Digest Algorithms
MD2, MD4, and MD5
Secure Hash Standard/Secure Hash Algorithm
(SHS/SHA)
Certificates
Certificate Servers
Key Management
Kerberos
Key-Exchange Algorithms (KEA)
……
 Chapter 4 Firewalling Challenges:The Basic Web
Chapter 5 Firewalling Challenges:The Advanced Web
Chapter 6 The API's Security Holes and its Firewall
Part 2 Firewall Implementations and Limitations
Chapter 7 What is an Internet/Intranet Firewall After All?
Chapter 8 How Vulnerable Are Internet Services?
Chapter 9 Setting Up a Firewall Security Policy
Chapter 10 Putting It Together:Firewall Design and Implementation
Chapter 11 proxy Servers
Chapter 12 Firewall Maintenance
Chapter 13 Firewall Toolkits and Case Studies
Part 3 Firewall Resource Guide
Chapter 14 Types of Firewalls and Products on the Market
Appendix A List of Firewall Resellers and Related Tools
Glossary
Bibliography
Index

本目录推荐