Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
William R. Cheswick (http://cheswick.com) is Chief Scientist at Lumeta Corporation, which explores and maps clients' network infrastructures and finds perimeter leaks. Formerly he was a senior researcher at Lucent Bell Labs, where he did pioneering work in the areas of firewall design and implementation, PC viruses, mailers, and Internet munitions.
Steven M. Bellovin (http://stevebellovin.com) is a Fellow at AT&T Labs Research, where he works on networks, security, and, especially, why the two don't get along. He is a member of the National Academy of Engineering and is one of the Security Area directors of the Internet Engineering Task Force. Long ago he was one of the creators of NetNews.
"I wish that Cheswick and Bellovin had written this six years ago. I could have nailed down my system and avoided chasing a spy around the world."
As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere that network reaches are all vulnerable to potentially disastrous infiltration by hackers.
Written by the AT&T Bell Labs researchers who tracked the infamous "Berferd" hacker and also built the firewall gateway at Bell Labs, Firewalls and Internet Security gives you invaluable advice and practical tools for protecting your organization's computers from the very real threat of a hacker attack through the Internet. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers - while still allowing you easy access to Internet services.
In particular, the authors show you a step-by-step plan for setting up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it.
You will be fascinated by their first-hand account of one of the first documented hacker attacks, the "Berferd" case, in which Internet hackers created havoc for computer networks worldwide. In addition, you will find vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security.
With this book in hand, you will be well equipped to provide your organization with effective protection from the wily Internet hacker.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Spese di spedizione:
EUR 3,73
In U.S.A.
Descrizione libro Paperback. Condizione: new. New. Fast Shipping and good customer service. Codice articolo Holz_New_0201633574
Descrizione libro Paperback. Condizione: new. Buy for Great customer experience. Codice articolo GoldenDragon0201633574
Descrizione libro Paperback. Condizione: new. New. Codice articolo Wizard0201633574
Descrizione libro Condizione: New. Book is in NEW condition. Codice articolo 0201633574-2-1
Descrizione libro Condizione: New. New! This book is in the same immaculate condition as when it was published. Codice articolo 353-0201633574-new
Descrizione libro Paperback. Condizione: new. New Copy. Customer Service Guaranteed. Codice articolo think0201633574
Descrizione libro Paperback. Condizione: New. Codice articolo Abebooks79838
Descrizione libro Condizione: New. New. In shrink wrap. Looks like an interesting title! 1.17. Codice articolo Q-0201633574
Descrizione libro Paperback. Condizione: Brand New. 320 pages. 9.09x7.32x0.91 inches. In Stock. Codice articolo 0201633574