防火墙技术指南

出版时间:2001-4  出版社:世界图书出版公司北京  作者:(美)Marcus Goncalves  页数:678  
Tag标签:无  

内容概要

This book is aimed primarily at network, Web, systems, LAN, and WAN administrators. But it is also targeted at the new breed of professionals, the so-called Internet Managers, as well as to anyone in need of a complete reference book on firewalls. As you read this book, you will notice that what separates it from the others is that this book is comprehensive and gives the technical information necessary to understand, choose, install, maintain, and foresee future needs involving firewalls and security at a very informal level. It has a conversational style with practical information, tips, and cautions to help the Internet, network, and security administrator to cope, and "survive" their tasks and responsibilities.

书籍目录

Preface.AcknowledgmentsPart I Introducing TCP/IP and the Need for Security: Firewalls  Chapter 1 Internetworking Protocols and Standards: An Overview    Internet Protocol (IP)    User Oatagram Protocol (UDP)    Transmission Control Protocol (TCP)    Extending IP Addresses Through CIDR    Routing Information Protocol (RIP)    MBONE-The Multicast Backbone    Internet Control Message Protocol (ICMP)    Internet Group Management Protocol (IGMP)    Open Shortest-Path First (OSPF)    Border Gateway Protocol Version 4 (BGP-4)    Address Resolution Protocol    Simple Network Management Protocol (SNMP)    Watch Your ISP Connection    The Internet Protocol Next Generation or IPv6    Network Time Protocol (NTP)    Dynamic Host Configuration Protocol (DHCP)    Windows Sockets    Domain Name System(DNS)    Firewalls Concepts  Chapter 2   Basic Connectivity    What Happened to      What Is the Baudot Code?    UNIX to UNIX CoPy (UUCP)    SLIP and PPP    Rlogin    Virtual Terminal Protocol (Telnet)       Columbia University's Kermit: A Secure and Reliable        Telnet Server      Telnet Services Security Considerations      A Systems Manager Approach to Network Security      Telnet Session Security Checklist    Trivial File Transfer Protocol (TFTP)      TFTP Security Considerations    File Transfer Protocol (FTP)    Some of the Challenges of Using Firewalls    Increasing Security on IP Networks  Chapter 3   Cryptography: Is It Enough?    Introduction    Symmetric Key Encryption (Private Keys)      Data Encryption Standard (DES)      International Data Encryption Algorithm (IDEA)      CAST      Skipjack      RC2/RC4    Asymmetric Key Encryption/Public Key Encryption      RSA      Digital Signature Standard (DSS)    Message Digest Algorithms      MD2, MD4, and MD5      Secure Hash Standard/Secure Hash Algorithm      (SHS/SHA)    Certificates      Certificate Servers    Key Management      Kerberos      Key-Exchange Algorithms (KEA)    …… Chapter 4 Firewalling Challenges:The Basic Web   Chapter 5 Firewalling Challenges:The Advanced Web   Chapter 6 The API's Security Holes and its FirewallPart 2 Firewall Implementations and Limitations  Chapter 7 What is an Internet/Intranet Firewall After All?  Chapter 8 How Vulnerable Are Internet Services?  Chapter 9 Setting Up a Firewall Security Policy  Chapter 10 Putting It Together:Firewall Design and Implementation  Chapter 11 proxy Servers  Chapter 12 Firewall Maintenance   Chapter 13 Firewall Toolkits and Case Studies Part 3 Firewall Resource Guide  Chapter 14 Types of Firewalls and Products on the MarketAppendix A List of Firewall Resellers and Related Tools Glossary Bibliography Index

图书封面

图书标签Tags

评论、评分、阅读与下载


    防火墙技术指南 PDF格式下载


用户评论 (总计0条)

 
 

 

250万本中文图书简介、评论、评分,PDF格式免费下载。 第一图书网 手机版

京ICP备13047387号-7