000 | 01942cam a2200421 i 4500 | ||
---|---|---|---|
999 |
_c200436373 _d54585 |
||
001 | 200436373 | ||
003 | TR-AnTOB | ||
005 | 20200108153056.0 | ||
007 | ta | ||
008 | 030113t20032003maua b 001 0 eng | ||
010 | _a2003000644 | ||
020 |
_a020163466X _q(paperback) |
||
020 |
_a9780201634662 _q(paperback) |
||
035 | _a(TR-AnTOB)200436373 | ||
040 |
_aDLC _beng _erda _cDLC _dC#P _dTR-AnTOB |
||
041 | 0 | _aeng | |
050 | 0 | 0 |
_aTK5105.875.I57 _bC44 2003 |
090 |
_aTK5105.875.I57 _bC44 2003 |
||
100 | 1 |
_aCheswick, William R. _eauthor _9125711 |
|
245 | 1 | 0 |
_aFirewalls and Internet security : _brepelling the wily hacker / _cWilliam R. Cheswick, Steven M. Bellovin, Aviel D. Rubin. |
250 | _aSecond edition. | ||
264 | 1 |
_aBoston : _bAddison-Wesley, _c[2003] |
|
264 | 4 | _c©2003 | |
300 |
_axx, 433 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
490 | 0 | _aAddison-Wesley professional computing series. | |
504 | _aIncludes bibliographical references (pages 350-388) and index | ||
505 | 0 | _aIntroduction -- A Security Review of Protocols: Lower Layers -- Securtiy Review: The Upper Layers -- The Web: Threat or Menace? --Classes of Attacks -- The Hacker's Workbench, and Other Munitions --Authentication -- Using Some Tools and Services -- Kinds of Firewalls -- Filtering Services -- Firewall Engineering -- Tunneling and VPNs -- Network Layout -- Safe Hosts in a Hostile Environment -- Intrusion Detection -- An Evening with Berferd -- The Taking of Clark -- Secure Communications over Insecure Networks -- Where Do We Go from Here?. | |
590 | _aDonated by Kemal Bıçakcı | ||
650 | 0 |
_aFirewalls (Computer security) _92655 |
|
700 | 1 |
_aBellovin, Steven M. _eauthor _9125712 |
|
700 | 1 |
_aRubin, Aviel D. _eauthor _9125713 |
|
942 |
_2lcc _cBK |