MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin.

By: Cheswick, William R.
Contributor(s): Bellovin, Steven M.
Material type: materialTypeLabelBookSeries: Addison-Wesley professional computing series.Publisher: Reading, Mass. : Addison-Wesley, 1994Description: xiv, 306 p. : ill. ; 24 cm.ISBN: 0201633574 .Subject(s): Firewalls (Computer security)DDC classification: 005.8
Contents:
I: Getting Started -- Introduction -- An Overview of TCP/IP -- II: Building Your Own Firewall -- Firewall Gateways -- How to build an Application-Level Gateway -- Authentication -- Gateway Tools -- Traps, Lures and Honey Pots -- The Hacker's Workbench -- III: A Look Back -- Classes of Attacks -- An Evening with Berferd -- Where the wild things are: A look at the Logs -- IV: Odds and Ends -- Legal Considerations -- Secure Communications over insecure networks -- Where do we go from here?
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00010132
General Lending MTU Bishopstown Library Store Item 005.8 (Browse shelf(Opens below)) 1 Available 00080759
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00080760
Total holds: 0

Enhanced descriptions from Syndetics:

- Cliff Stoll, author of The Cuckoos Egg: Tracking a Spy Through the Maze of Computer Espionage As a user of the Internet, you are fortunate to be tied into the worlds greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organizations network, and everywhere that network reaches are all vulnerable to potentially disastrous infiltration by hackers. Written by the AT&T Bell Labs researchers who tracked the infamous Berferd hacker and also built the firewall gateway at Bell Labs, Firewalls and Internet Security gives you invaluable advice and practical tools for protecting your organizations computers from the very real threat of a hacker attack through the Internet. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers - while still allowing you easy access to Internet services. In particular, the authors show you a step-by-step plan for setting up a firewall gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gatewa

Bibliography: (pages 257-276) and index.

I: Getting Started -- Introduction -- An Overview of TCP/IP -- II: Building Your Own Firewall -- Firewall Gateways -- How to build an Application-Level Gateway -- Authentication -- Gateway Tools -- Traps, Lures and Honey Pots -- The Hacker's Workbench -- III: A Look Back -- Classes of Attacks -- An Evening with Berferd -- Where the wild things are: A look at the Logs -- IV: Odds and Ends -- Legal Considerations -- Secure Communications over insecure networks -- Where do we go from here?

Table of contents provided by Syndetics

  • Preface
  • I Getting Started
  • 1 Introduction
  • Why Security?
  • Picking a Security Policy
  • Strategies for a Secure Network
  • The Ethics of Computer Security
  • Warning
  • 2 An Overview of TCP/IP
  • The Different Layers
  • Routers and Routing Protocols
  • The Domain Name System
  • Standard Services
  • RPC
  • Based Protocols
  • File Transfer Protocols
  • The r Commands
  • Information Services
  • The X11 System
  • Patterns of Trust
  • II Building Your Own Firewall
  • 3 Firewall Gateways
  • Firewall Philosophy
  • Situating Firewalls
  • Packet-Filtering Gateways
  • Application-Level Gateways
  • Circuit-Level Gateways
  • Supporting Inbound Services
  • Tunnels Good and Bad
  • Joint Ventures
  • What Firewalls Can't Do
  • 4 How to Build an Application-Level Gateway
  • Policy
  • Hardware Configuration Options
  • Initial Installation
  • Gateway Tools
  • Installing Services
  • Protecting the Protectors
  • Gateway Administration
  • Safety Analysis (Why Our Setup Is Secure and Fail-Safe)
  • Performance
  • The TIS Firewall Toolkit
  • Evaluating Firewalls
  • Living Without a Firewall
  • 5 Authentication
  • User Authentication
  • Host-to-Host Authentication
  • 6 Gateway Tools
  • Proxylib
  • Syslog
  • Watching the Network: Tcpdump and Friends
  • Adding Logging to Standard Daemons
  • 7 Traps, Lures, and Honey Pots
  • What to Log
  • Dummy Accounts
  • Tracing the Connection
  • 8 The Hacker's Workbench
  • Introduction
  • Discovery
  • Probing Hosts
  • Connection Tools
  • Routing Games
  • Network Monitors
  • Metastasis
  • Tiger Teams
  • Further Reading
  • III A Book Back
  • 9 Classes of Attacks
  • Stealing Passwords
  • Social Engineering
  • Bugs and Backdoors
  • Authentication Failures
  • Protocol Failures
  • Information Leakage
  • Denial-of-Service
  • 10 An Evening with Berferd
  • Introduction
  • Unfriendly Acts
  • An Evening with Berferd
  • The Day After
  • The Jail
  • Tracing Berferd
  • Berferd Comes Home
  • 11 Where the Wild Things Are: A Look at the Logs
  • A Year of Hacking
  • Proxy Use
  • Attack Sources
  • Noise on the Line
  • IV Odds And Ends
  • 12 Legal Considerations
  • Computer Crime Statutes
  • Log Files as Evidence
  • Is Monitoring Legal?
  • Tort Liability Considerations
  • 13 Secure Communications over Insecure Networks
  • An Introduction to Cryptography
  • The Kerberos Authentication System
  • Link-Level Encryption
  • Network- and Transport-Level Encryption
  • Application-Level Encryption
  • 14 Where Do We Go from Here?
  • Appendix A Useful Free Stuff
  • Building Firewalls
  • Network Management and Monitoring Tools
  • Auditing Packages
  • Cryptographic Software
  • Information Sources
  • Appendix B TCP and UDP Ports
  • Fixed Ports
  • MBone Usage
  • Appendix C Recommendations to Vendors
  • Everyone
  • Hosts
  • Routers
  • Protocols
  • Firewalls
  • Bibliography
  • List of Bombs
  • Index

Author notes provided by Syndetics

William R. Cheswick ( http://cheswick.com ) is Chief Scientist at Lumeta Corporation, which explores and maps clients' network infrastructures and finds perimeter leaks. Formerly he was a senior researcher at Lucent Bell Labs, where he did pioneering work in the areas of firewall design and implementation, PC viruses, mailers, and Internet munitions.

Steven M. Bellovin ( http://stevebellovin.com ) is a Fellow at AT&T Labs Research, where he works on networks, security, and, especially, why the two don't get along. He is a member of the National Academy of Engineering and is one of the Security Area directors of the Internet Engineering Task Force. Long ago he was one of the creators of NetNews.



0201633574AB01302003

Powered by Koha