Firewalls and Internet Security: Repelling the Wily Hacker. Authors: William R. Cheswick · Steven M. Bellovin · Aviel D. Rubin. The best-selling first edition of Firewalls and Internet Security became the bible of William R. Cheswick () is Chief Scientist at Lumeta. Firewalls and Internet Security by William R. Cheswick, , available at Book Depository with free delivery worldwide.
|Published (Last):||20 April 2010|
|PDF File Size:||4.20 Mb|
|ePub File Size:||5.41 Mb|
|Price:||Free* [*Free Regsitration Required]|
Repelling the Wily Hacker, Second Edition”. As the first work to deal seriously and completely with the topic, the first edition of “Firewalls and Internet Security” was one of those classics that get known only by the last names of the authors, so as not to leave any possibility of confusion with books whose titles may cheswock similar.
When such a long time has elapsed between editions of a work such as this, it is more than possible that the field has moved on far enough that a minor updating of the material is simply not feasible.
“Firewalls and Internet Security”, William R. Cheswick/Steven M. Bellovin/Aviel D. Rubin,
The authors are quite well aware of the new territory: A huge undertaking, but the only practical course, in the circumstances. Part one establishes a starting point.
Chapter one, an introduction, presents a number of basic, but worthwhile, security concepts. The authors’ thoughts on the security of the Web are amply expressed in the title of chapter four: Part two outlines the threats to networked machines. Chapter five describes a number of different types of attacks. Part three details security tools and utilities.
Firewalls and Internet Security: Repelling The Wily Hacker
Chapter seven reviews authentication concepts and techniques. Various network security systems are described in chapter eight.
Part four gets us to firewalls and virtual private networks VPNs themselves. Chapter nine outlines the different types of firewalls. Basic filtering concepts are examined in chapter ten. Considerations for constructing and tuning your firewall are in chapter eleven. Tunnelling and VPNs are discussed in chapter twelve.
Part five extends the isolated technology of firewalls into the application of protecting an organization. Network layout, and the implications thereof, is reviewed in securiity thirteen.
Firewalls and Internet Security : William R. Cheswick :
Chapter fourteen deals with hardening of hosts. Chapter fifteen is a rather terse look at intrusion detection. Part six is entitled “Lessons Learned.
In chapter eighteen, Kerberos and IPSec are used as examples of approaches to security of insecure networks. Chapter nineteen finishes with some ideas for work that yet needs to be done to help with the security of the Internet.
Firewalls and Internet Security : Repelling the Wily Hacker
The place of firewalls in regard to network security has broadened considerably in the past decade. This book does reflect that reality.
Unfortunately, that breadth of topic has come at the expense of some depth in coverage. The result is a book that is interjet worthwhile as an introduction to the field, but which may no longer be suitable as a working reference. I must admit that, for some time, I have been recommending Chapman and Zwicky cf.
Upon reviewing this new edition of the classic, I would have to stick to that recommendation.