000 01942cam a2200421 i 4500
999 _c200436373
_d54585
001 200436373
003 TR-AnTOB
005 20200108153056.0
007 ta
008 030113t20032003maua b 001 0 eng
010 _a2003000644
020 _a020163466X
_q(paperback)
020 _a9780201634662
_q(paperback)
035 _a(TR-AnTOB)200436373
040 _aDLC
_beng
_erda
_cDLC
_dC#P
_dTR-AnTOB
041 0 _aeng
050 0 0 _aTK5105.875.I57
_bC44 2003
090 _aTK5105.875.I57
_bC44 2003
100 1 _aCheswick, William R.
_eauthor
_9125711
245 1 0 _aFirewalls and Internet security :
_brepelling the wily hacker /
_cWilliam R. Cheswick, Steven M. Bellovin, Aviel D. Rubin.
250 _aSecond edition.
264 1 _aBoston :
_bAddison-Wesley,
_c[2003]
264 4 _c©2003
300 _axx, 433 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 0 _aAddison-Wesley professional computing series.
504 _aIncludes bibliographical references (pages 350-388) and index
505 0 _aIntroduction -- A Security Review of Protocols: Lower Layers -- Securtiy Review: The Upper Layers -- The Web: Threat or Menace? --Classes of Attacks -- The Hacker's Workbench, and Other Munitions --Authentication -- Using Some Tools and Services -- Kinds of Firewalls -- Filtering Services -- Firewall Engineering -- Tunneling and VPNs -- Network Layout -- Safe Hosts in a Hostile Environment -- Intrusion Detection -- An Evening with Berferd -- The Taking of Clark -- Secure Communications over Insecure Networks -- Where Do We Go from Here?.
590 _aDonated by Kemal Bıçakcı
650 0 _aFirewalls (Computer security)
_92655
700 1 _aBellovin, Steven M.
_eauthor
_9125712
700 1 _aRubin, Aviel D.
_eauthor
_9125713
942 _2lcc
_cBK