download magazines books audio for free depositlib

Журналы, книги, аудиокниги. depositlib

Все книги Журналы Книги Аудиокниги Контакты

DepositLib - Лучшие книги, журналы и публикации


Информирует depositlib.com


Авторские права на книги, журналы, аудиокниги и издания принадлежат авторам! Ссылки на журналы, книги предоставлены для ознакомления с ними. Заполнив форму обратной связи Вы можете внести свои предложения.

Прочая информация


Ознакомиться с удивительным миром журналов и книг. Литература в электронном виде (pdf, txt, djvu, mp3) Именно это предоставлено для Вас, но возможно и другое.

Cheswick W.R., Firewalls and Internet Security. Second Edition. Это Книга в фомате PDF избранное
Книга:

Firewalls and Internet Security. Second Edition , Cheswick W.R.

 
Firewalls and Internet Security. Second Edition
Название: Firewalls and Internet Security. Second Edition
Автор: Cheswick W.R.
Издательство: Addison-Wesley Professional
Год издания: 2003
Язык: Английский
Формат: PDF
Страниц: 464
Размер: 57 Mb
Качество: Отличное
Раздел: Безопасность, хакерство, Операционные системы, Сетевые технологии


This book is all about Internet security, firewalls, VPNs and much more, all of which are hot topics and renowned buzzwords within today's IT industry.

In the first chapter, the authors express their view on network security and demonstrate the different methods an Administrator can use in order to secure their network(s). This is carried out by categorizing security into Host-Based and Perimeter security.

The second and third chapters are approximately 50 pages covering basic protocols, including IPv6, DNS, FTP, SNMP, NTP, RPC-based protocols and a several more like the famous NAT. The chapters are concluded with a summary on wireless security.

The next five chapters (chapter 4 to 8 inclusive), analyze various attacks used against networks and server operating systems in an attempt to exploit them. There is a wealth of information concerning hacking, allowing the reader to enter the mind of a hacker in terms of what they think and how they proceed to meet their goal.

One complete chapter is dedicated to various password tactics in which one can ensure that a hacker's life is made more difficult should they attempt to break into a few accounts using well-known methods related to password guessing. CHAP, PAP, Radius and PKI are also analyzed.

Chapter 9 to 12 are dedicated to Firewalls and VPNs which, in passing, happen to be my favourite chapters. They offer an in-depth analysis of the Firewall concept, packet filtering, application-level filtering and circuit level gateways. It proceeds with information about the filtering services, giving detailed examples on how one could use IPChains to create a simple or complex set of rules to efficiently block/permit packets entering in and out the network. This is perhaps the only downside to this informative book, where IPTables would have been beneficial to include, since people rarely use IPchains these days.

Lastly, chapter 12 talks about VPNs, their encryption methods, and considers both their weaknesses and advantages.

In addition to this, the book continues with several more chapters covering general questions that may arise for the reader, such as intranet routing, administration security and intrusion detection systems.

Towards the end, the authors talk about their personal experiences with people trying to hack into their companies and, as a result, explain the step- by- step process of how they managed to fight them and secure their networks. These pages are simply a goldmine for anyone interested in this area.

Table of Contents:

1. Introduction.
2. A Security Review of Protocols: Lower Layers.
3. Security Review: The Upper Layers.
4. The Web: Threat or Menace?
5. Classes of Attacks.
6. The Hacker's Workbench, and Other Munitions.
7. Authentication.
8. Using Some Tools and Services.
9. Kinds of Firewalls.
10. Filtering Services.
11. Firewall Engineering.
12. Tunneling and VPNs.
13. Network Layout.
14. Safe Hosts in a Hostile Environment.
15. Intrusion Detection.
16. Une Soirie avec Berferd.
17. The Taking of Clark.
18. Secure Communications over Insecure Networks.
19. Where Do We Go from Here?


 
 
Книга "Firewalls and Internet Security. Second Edition" ознакомиться [depositfiles.com] [letitbit.net]

  
Уважаемый посетитель, Вы зашли на сайт depositlib.com как незарегистрированный пользователь. Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
 
 

Здесь схожие по по темантике (Безопасность, хакерство, Операционные системы, Сетевые технологии) книги, журналы и аудиокниги. depositlib, для ознакомления.

Wireless Security Handbook Wireless Security Handbook
This handbook overviews wireless network security from the perspectives of the auditor, security architect, and hacker, revealing the technical details of how to design, build, and hack almost all wireless security methods. Discussion

Fedora Linux Toolbox. 1000+ Commands for Fedora, CentOS, and Red Hat Power  ... Fedora Linux Toolbox. 1000+ Commands for Fedora, CentOS, and Red Hat Power ...
Aimed squarely at aspiring Linux power users and professional administrators, the Fedora Linux Toolbox offers more than 1000 examples of useful Linux command lines. This compact, handy reference is made to carry with you, wh

Видеокурс Kaspersky Internet Security 2009 Видеокурс Kaspersky Internet Security 2009
В этом курсе рассказывается, как эффективно защитить персональный компьютер с помощью Антивируса Касперского или Kaspersky Internet Security. Поскольку все функции Антивируса Касперского доступны также и в Kaspersky Internet Secur

Principles of Broadband Switching and Networks Principles of Broadband Switching and Networks
Principles of Broadband Switching and Networking explains the design and analysis of switch architectures suitable for broadband integrated services networks, emphasizing packet-switched interconnection networks with distributed routing

Beginning PHP6, Apache, MySQL6 Web Development Beginning PHP6, Apache, MySQL6 Web Development
Apache, MySQL and PHP are each complex in and of themselves, and it's impossible for this book to cover every advanced detail of all three. The purpose of this book is to give you the best possible foundation for understanding how each

OpenSUSE 11 and SUSE Linux Enterprise Server Bible OpenSUSE 11 and SUSE Linux Enterprise Server Bible
Welcome to the OpenSUSE 11.0 and SUSE Linux Enterprise Server Bible! This book is for anyone who is interested in running a SUSE Linux system — at home or at work, ‘‘for fun or for profit.’’ It covers the a