Building Internet Firewalls, Paperback by Zwicky, Elizabeth D.; Cooper, Simon...

MongrelDotCom
(118)
Angemeldet als privater Verkäufer
Verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, finden daher keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe. Mehr erfahren
US $10,00
Ca.EUR 8,65
Artikelzustand:
Akzeptabel
Ganz entspannt. Rückgaben akzeptiert.
Versand:
US $9,74 (ca. EUR 8,42) USPS Ground Advantage®.
Standort: Alexandria, Virginia, USA
Lieferung:
Lieferung zwischen Sa, 15. Nov und Fr, 21. Nov nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
14 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:205836694484

Artikelmerkmale

Artikelzustand
Akzeptabel: Buch mit deutlichen Gebrauchsspuren. Der Einband kann einige Beschädigungen aufweisen, ...
Book Title
Building Internet Firewalls
ISBN
9781565928718
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
O'reilly Media, Incorporated
ISBN-10
1565928717
ISBN-13
9781565928718
eBay Product ID (ePID)
1680057

Product Key Features

Number of Pages
894 Pages
Language
English
Publication Name
Building Internet Firewalls : Internet and Web Security
Subject
Security / Online Safety & Privacy, General, Security / Networking
Publication Year
2000
Type
Textbook
Author
Simon Cooper, D. Brent Chapman, Elizabeth D. Zwicky
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
1.8 in
Item Weight
53.3 Oz
Item Length
9.3 in
Item Width
7.6 in

Additional Product Features

Edition Number
2
Intended Audience
Scholarly & Professional
LCCN
00-039954
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Preface Part I: Network Security Chapter 1: Why Internet Firewalls? Chapter 2: Internet Services Chapter 3: Security Strategies Part II: Building Firewalls Chapter 4: Packets and Protocols Chapter 5: Firewall Technologies Chapter 6: Firewall Architectures Chapter 7: Firewall Design Chapter 8: Packet Filtering Chapter 9: Proxy Systems Chapter 10: Bastion Hosts Chapter 11: Unix and Linux Bastion Hosts Chapter 12: Windows NT and Windows 2000 Bastion Hosts Part III: Internet Services Chapter 13: Internet Services and Firewalls Chapter 14: Intermediary Protocols Chapter 15: The World Wide Web Chapter 16: Electronic Mail and News Chapter 17: File Transfer, File Sharing, and Printing Chapter 18: Remote Access to Hosts Chapter 19: Real-Time Conferencing Services Chapter 20: Naming and Directory Services Chapter 21: Authentication and Auditing Services Chapter 22: Administrative Services Chapter 23: Databases and Games Chapter 24: Two Sample Firewalls Part IV: Keeping Your Site Secure Chapter 25: Security Policies Chapter 26: Maintaining Firewalls Chapter 27: Responding to Security Incidents Part V: Appendixes Appendix A: Resources Appendix B: Tools Appendix C: Cryptography Colophon
Synopsis
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, "Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools., The first edition explains how to design and install firewalls, and how to configure Internet services to work with a firewall. This second edition covers Linux and Windows NT, as well as Unix platforms, and a variety of new Internet services and protocols.
LC Classification Number
TK5105.59.Z85 2000

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

MongrelDotCom

98,5% positive Bewertungen176 Artikel verkauft

Mitglied seit Mär 1999
Antwortet meist innerhalb 12 Stunden
Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe. Mehr erfahrenMehr erfahren
Ready to find something special? Discover your next unique treasure at MongrelDotCom! We cater to every passion, whether you're a passionate collector, a serious gamer, a music lover, or a business ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.7
Angemessene Versandkosten
4.8
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (83)

Alle Bewertungenselected
Positiv
Neutral
Negativ
  • s***s (1151)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    I've been on ebay 27 years and this was one of my top five buying experiences. The seller answered numerous questions quickly, sent extra photographs, accepted my offer, and shipped the robots quickly and very securely in large amounts of bubble wrap. I cannot think of enough adjectives to describe this wonderful seller! Thanks so much for everything.
  • e***t (440)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Yamaha NS-6490 3 Way Bookshelf Speakers - Used - 140 Watts matches listing description. Fair price. Pro ebay shipper. A++++!!!
  • a***l (214)- Bewertung vom Käufer.
    Letztes Jahr
    Bestätigter Kauf
    Item arrived securely packaged, shipped at a fair price and it arrived a day earlier than anticipated! Seller worked through a mix-up with me, and was professional and friendly throughout the process. Thank you for a good transaction.