书籍详情
《防火墙技术指南》[54M]百度网盘|亲测有效|pdf下载
  • 防火墙技术指南

  • 出版社:世界图书出版公司北京公司京东自营官方旗舰店
  • 出版时间:2001-04
  • 热度:11583
  • 上架时间:2024-06-30 09:38:03
  • 价格:0.0
书籍下载
书籍预览
免责声明

本站支持尊重有效期内的版权/著作权,所有的资源均来自于互联网网友分享或网盘资源,一旦发现资源涉及侵权,将立即删除。希望所有用户一同监督并反馈问题,如有侵权请联系站长或发送邮件到ebook666@outlook.com,本站将立马改正

内容介绍

内容简介

Information contained in this work has been obtained by The McGraw-Hill Companies,lnc. ("McGraw-Hill") from sources believed to be reliable. However,neither McGraw-Hill nor its authors guarantees the accuracy or completeness of any information published herein and neither McGraw-Hill nor its authors shall be responsible for any errors, omissions, or damages arising out of use of this information. This work is published with the understanding that McGraw-Hill and its authors are supplying information but are not attempting to render engineering or other professional services, Ifsuch services are required, the assistance of an appropriate professional should be sought.

目录

Preface
Acknowledgments
Part 1 Introducing TCP/IP and the Need for Security:Firewalls
Chapter lInternetworking Protocols and Standards:An Overview
Internet Protocol (IP)
How IP Addressing Works
IP Security Risks
User Datagram Protocol (UDP)
Attacking UDP Services: SATAN at Ease
ISS for UNIX and Windows NT
Transmission Control Protocol (TCP)
IP Addresses
Extending IP Addresses Through CIDR
TCP/IP Security Risks and Countermeasures
IPSEC-An IETF IP Security Countermeasure
IPSO-A DOD IP Security Countermeasure
Routing Information Protocol (RIP)
MBONE - The Multicast Backbone
Internet Control Message Protoco( (ICMP)
Internet Group Management Protocol (IGMP)
Open Shortest-Path First (OSPF)
Border Gateway Protocol Version 4 (BGP4)
Address Resolution Protocol
Reverse Address Resolution Protocol (RARP)
Security Risks of Passing IP Datagrams Through
Routers
Simple Network Management Protocol (SNMP)
Watch Your ISP Connection
The Internet Protocol Next Generation or IPv6
Address Expansion
Automatic Configuration of Network Devices
Security
Real-Time Perf ormance
Multicasting
IPv6 Security
Network Time Protocol (NTP)
Dynamic Host Conguration Protocol (DHCP)
Windows Sockets
Domain Name System (DNS)
Limiting DNS Information
Firewalls Concepts
The Flaws in Firewalls
Fun with DMZs
Authentication lssues
Trust at the Perimeter
Intranets
Chapter 2Basic Connectivity
What Happened to TTY
What Is the Baudot Code?
UNIX to UNIX CoPy (UUCP)
SLIP and PPP
Rlogin
Virtual Terminal Protocol (Telnet) .
Columbia University' Kermit: A Secure and Reliable
Telnet Server
Telnet Services Security Considerations
A Systems Manager Approach to Network Security
Telnet Session Security Checklist
Trivial File Transfer Protocol (TFTP)
TFTP Security Considerations
File Transfer Protocol (FTP)
Some of the Challenges of Using Firewalls
Increasing Security on lP Networks
Chapter 3 Cryptography: Is It Enough?
Introduction
Symmetric Key Encryption (Private Keys)
Data Encryption Standard (DES)
International Data Encryption Afgorithm (IDEA)
CAST
Skipjack
RC2/RC4
Asymmetric Key Encryption/Public Key Encryption
RSA
Digital Signature Standard (DSS)
Message Digest Algorithms
MD2, MD4, and MD5
Secure Hash Standard/Secure Hash Algorithm
(SHS/SHA)
Certificates
Certificate Servers
Key Management
Kerberos
Key-Exchange Algorithms (KEA
……
Part 2 Firewall Implementations and Limitations
Part 3 Firewall Resource Guide
Appendix A List of Firewall Resellers and Related Tools
Glossary
Bibliography
Index