Image from Google Jackets

Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin.

By: Contributor(s): Material type: TextTextLanguage: İngilizce Series: Addison-Wesley professional computing seriesPublisher: Boston : Addison-Wesley, [2003]Copyright date: ©2003Edition: Second editionDescription: xx, 433 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 020163466X
  • 9780201634662
Subject(s): LOC classification:
  • TK5105.875.I57 C44 2003
Contents:
Introduction -- A Security Review of Protocols: Lower Layers -- Securtiy Review: The Upper Layers -- The Web: Threat or Menace? --Classes of Attacks -- The Hacker's Workbench, and Other Munitions --Authentication -- Using Some Tools and Services -- Kinds of Firewalls -- Filtering Services -- Firewall Engineering -- Tunneling and VPNs -- Network Layout -- Safe Hosts in a Hostile Environment -- Intrusion Detection -- An Evening with Berferd -- The Taking of Clark -- Secure Communications over Insecure Networks -- Where Do We Go from Here?.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Status Notes Date due Barcode
Book Book Merkez Kütüphane Genel Koleksiyon / Main Collection Merkez Kütüphane Genel Koleksiyon TK5105.875.I57 C44 2003 (Browse shelf(Opens below)) Available Donated by Kemal Bıçakcı 0060340

Introduction -- A Security Review of Protocols: Lower Layers -- Securtiy Review: The Upper Layers -- The Web: Threat or Menace? --Classes of Attacks -- The Hacker's Workbench, and Other Munitions --Authentication -- Using Some Tools and Services -- Kinds of Firewalls -- Filtering Services -- Firewall Engineering -- Tunneling and VPNs -- Network Layout -- Safe Hosts in a Hostile Environment -- Intrusion Detection -- An Evening with Berferd -- The Taking of Clark -- Secure Communications over Insecure Networks -- Where Do We Go from Here?.

Donated by Kemal Bıçakcı

There are no comments on this title.

to post a comment.
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.