• RRP: £36.99
  • You Save: £1.85 (5%)
FREE Delivery in the UK.
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Quantity:1
Firewalls and Internet Se... has been added to your Basket
+ £2.80 UK delivery
Used: Good | Details
Condition: Used: Good
Comment: Ships from the UK. Former Library books. Shows some signs of wear, and may have some markings on the inside. 100% Money Back Guarantee. Your purchase also supports literacy charities.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition) (Addison-Wesley Professional Computing (Paperback)) Paperback – 24 Feb 2003

4.3 out of 5 stars 9 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
£35.14
£26.56 £0.01
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
click to open popover

Special Offers and Product Promotions


Frequently Bought Together

  • Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition) (Addison-Wesley Professional Computing (Paperback))
  • +
  • Building Internet Firewalls
Total price: £78.13
Buy the selected items together

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.




Product details

  • Paperback: 464 pages
  • Publisher: Addison-Wesley Professional; 2 edition (24 Feb. 2003)
  • Language: English
  • ISBN-10: 020163466X
  • ISBN-13: 978-0201634662
  • Product Dimensions: 18.5 x 3 x 23.1 cm
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Bestsellers Rank: 709,513 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

Amazon Review

Essential information for anyone wanting to protect Internet-connected computers from unauthorised access. Includes:

  • thorough discussion of security-related aspects of TCP/IP;
  • step-by-step plans for setting up firewalls;
  • hacking and monitoring tools the authors have built to rigorously test and maintain firewalls;
  • pointers to public domain security tools on the net;
  • first-hand step-by-step accounts of battles with the "Berferd" hackers; and
  • practical discussions of the legal aspects of security.

--Jake Bond --This text refers to an out of print or unavailable edition of this title.

From the Back Cover

The best-selling first edition ofFirewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the security problems companies face in today's Internet, identifies the weaknesses in the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Readers will learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers.

Firewalls and Internet Security, Second Edition, draws upon the authors' experiences as researchers in the forefront of their field since the beginning of the Internet explosion.

The book begins with an introduction to their philosophy of Internet security. It progresses quickly to a dissection of possible attacks on hosts and networks and describes the tools and techniques used to perpetrate--and prevent--such attacks. The focus then shifts to firewalls and virtual private networks (VPNs), providing a step-by-step guide to firewall deployment. Readers are immersed in the real-world practices of Internet security through a critical examination of problems and practices on today's intranets, as well as discussions of the deployment of a hacking-resistant host and of intrusion detection systems (IDS). The authors scrutinize secure communications over insecure networks and conclude with their predictions about the future of firewalls and Internet security.

The book's appendixes provide an introduction to cryptography and a list of resources (also posted to the book's Web site) that readers can rely on for tracking further security developments.

Armed with the authors' hard-won knowledge of how to fight off hackers, readers of Firewalls and Internet Security, Second Edition, can make security decisions that will make the Internet--and their computers--safer.



020163466XB01302003

See all Product Description

Customer Reviews

4.3 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
Firewalls & Internet Security: Second Edition
Repelling the Wily Hacker
(Addion Wesley)
William R. Cheswick
Steven M. Bellovin
Aviel D. Rublin
The introduction starts with security truisms a section on picking and defining a security policy. This deals with ethics, strategies and different methods such as host or perimeter security. It touches on encryption and DMZs.
Chapter 2 then gives an overview of TCP/IP covering some common
basic infrastructure protocols. Starting with IP addressing and TCP, the chapter progresses routing, DNS and NAT. It ends with potential risks associated with wireless security.
The third chapter deals with the upper layers. A major focus here is mail transport protocols such as SMTP and the dangers associated with MIME encoded messages. The daemon used in context is sendmail and mail relaying is described. An introduction to RPCbind and NFS are presented along with the dangers of remote access including FTP, SSH and Rlogin.
Chapter 4 is entitled 'the web: threat or menace?' This explains
risks from activeX and javascript through to server side scripting.
The fifth section deals with classes of attacks which covers some
interesting contemporary subjects such as social engineering, backdoors, authentication failures and virii. There are four pages describing what to do about a denial of service attack which descibes a logical approach to mitigating an attack.
Chapter 6, 'the hacker's workbench' goes into more detail about
hacking tools and techniques. Methods such as scanning, rootkits
and clearing logs are described along with popular tools such as
nmap and juggernaut.
Read more ›
Comment 13 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This was very useful, describing the true aspects and functionality of network security. If your using NT / *NIX or a hardware solution for your gateway/firewall configurations, this book will get your thoughts racing.
Not for the mild hearted, it does require a certain amount of knowledge of networking and security, but stick with it...
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By A Customer on 20 Dec. 1999
Format: Paperback
For the budding unix administrator who still needs to learn the finer details of network protocols, and more to the point, how the various *nix systems handle them, this is the perfect book, along with this is throws in a good insight into common mistakes and exploited failures made when setting up a system. In a day and age when security is everything, this is a highly recomended book.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Firewalls and protocol analysis are two subjects which would ordinarily be dry, dull and sleep-inducing reading. This book manages to hold the reader's interest from cover to cover, throwing in anecdotes and the tale of berferd to illustrate points of network security. Even if you think you know all there is to know about security, this book is required reading for any network professional.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Covers the weaknesses of TCP/IP and higher protocols in good detail. Occasionally difficult for the beginner but definitely manages to keep the interest up. Made me want to know much more about TCP/IP.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse


Feedback