Firewalls and Internet Security: Repelling the Wily Hacker. Authors: William R. Cheswick · Steven M. Bellovin · Aviel D. Rubin. The best-selling first edition of Firewalls and Internet Security became the bible of William R. Cheswick () is Chief Scientist at Lumeta. Firewalls and Internet Security by William R. Cheswick, , available at Book Depository with free delivery worldwide.
|Published (Last):||3 December 2006|
|PDF File Size:||17.80 Mb|
|ePub File Size:||11.96 Mb|
|Price:||Free* [*Free Regsitration Required]|
Repelling the Wily Hacker, Second Edition”.
As the first work to deal seriously and completely with the topic, the first edition of “Firewalls and Internet Security” was one of those classics that get known only by the last names of the authors, so fireawlls not to leave any possibility of confusion with books whose titles may be similar.
When such a long time has elapsed between editions of a work such as this, it is more than possible that the field has moved on far enough that a minor updating of the material is simply secyrity feasible. The authors are quite well aware of the new territory: A huge undertaking, but the only practical course, in the circumstances. Part one establishes a starting point.
Cheswick & Bellovin, Firewalls and Internet Security: Repelling The Wily Hacker | Pearson
Chapter one, an introduction, presents a number of basic, but worthwhile, security concepts. The authors’ thoughts on the security of the Web are amply expressed in the title of chapter four: Part two outlines the threats to networked machines. Chapter five describes a number of different types of attacks. Part three details security tools and utilities.
frewalls Chapter seven reviews authentication concepts and techniques. Various network security systems are described in chapter eight. Part four gets us to firewalls and virtual private networks VPNs themselves.
Firewalls and Internet Security : William R. Cheswick :
Chapter nine outlines the different types of firewalls. Basic filtering concepts are examined in anv ten. Considerations for constructing and tuning your firewall are in chapter eleven. Tunnelling and VPNs are discussed in chapter twelve. Part five extends the isolated technology of firewalls into the application of protecting an organization. Network layout, and the implications thereof, is reviewed in chapter thirteen.
Chapter fourteen deals with hardening of hosts.
Chapter fifteen is a rather terse look at intrusion detection. Part six is entitled “Lessons Learned.
Firewalls and Internet Security : Repelling the Wily Hacker
In chapter eighteen, Kerberos and IPSec are used as examples of approaches to security of insecure networks. Chapter nineteen finishes with firewxlls ideas for work that yet needs to be done to help with the security of the Internet.
The place of firewalls in regard to network security has broadened considerably in the past decade. This book does reflect that reality.
Firewalls and Internet Security: Repelling The Wily Hacker
Unfortunately, that breadth of topic has come at the expense of some depth in coverage. The result is a book that is definitely worthwhile as an introduction to the field, but which may no longer be suitable as a working reference.
I must admit that, for some time, I have been recommending Chapman and Zwicky cf. Upon reviewing this new edition of the classic, I would have to stick to that recommendation.