Zwicky, Elizabeth D.; Cooper, Simon; Chapman, D. Brent
Resumen:
Preface -- Part I. Network security -- 1. Why internet firewalls? -- 2. Internet services -- 3. Security strategies -- Part II. Building firewalls -- 4. Packets and protocols -- 5. Firewall technologies -- 6. Firewall architectures -- 7. Firewall design -- 8. Packet filtering -- 9. Proxy systems -- 10. Bastion hosts -- 11. Unix and linux bastion hosts -- 12. Windows NT and Windows 2000 bastion hosts -- Part III. Internet services -- 13. Internet services and firewalls -- 14. Intermediary protocols -- 15. The world wide web -- 16. Electronic mail and news -- 17. File transfer, file sharing, and printing -- 18. Remote access to hosts -- 19. Real-time conferencing services -- 20. Naming and directory services -- 21. Authentication and auditing services -- 22. Administrative services -- 23. Databases and games -- 24. Two sample firewalls -- Part IV. Keeping your site secure -- 25. Security policies -- 26. Maintaining firewalls -- 27. Responding to security incidents -- Part V. Appendixes -- Appendix A. Resources -- Appendix B. Tools -- Appendix C. Cryptography