Red Hat Linux Firewalls
Bill McCarty
- 出版商: Hungry Minds
- 出版日期: 2002-12-06
- 售價: $1,900
- 貴賓價: 9.5 折 $1,805
- 語言: 英文
- 頁數: 552
- 裝訂: Paperback
- ISBN: 0764524631
- ISBN-13: 9780764524639
-
相關分類:
Linux
已過版
買這商品的人也買了...
-
$580$458 -
$2,176Refactoring: Improving the Design of Existing Code (Hardcover)
-
$1,029Fundamentals of Logic Design, 4/e
-
$950$855 -
$920$727 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$820$199 -
$2,350$2,233 -
$1,860$1,767 -
$1,650$1,568 -
$620$558 -
$280$218 -
$750$638 -
$620$558 -
$490$387 -
$650$553 -
$590$466 -
$690$538 -
$720$569 -
$850$723 -
$560$504 -
$450$351 -
$490$417 -
$580$458 -
$580$458
相關主題
商品描述
* Everything readers need to construct firewalls that protect computer
networks from attacks and intrusions
* Covers the migration from ipchains and
how to mange iptable log files
* Reviews the customization of firewalls, the
Red Hat firewall tool, the firewall setup, and advanced firewall features
*
Includes numerous examples of firewalls and firewall administration techniques
that work on Red Hat Linux systems
* Explains how to cost-justify, implement,
test, and operate packet filtering firewalls constructed using Red Hat
Linux
RED HAT(r) PRESS(TM)
Linux Solutions from the Experts at Red
Hat
Red Hat-the world's leading Linux company-presents a series of unrivaled
guides that are reviewed and approved by the experts at Red Hat. Each book is
packed with invaluable tips and techniques that are ideal for everyone from
beginning to advanced network and systems professionals, as well as home and
small businesses
Table of Contents
Foreword.
Preface.
Acknowledgments.
Part I: The Network Security Context.
Chapter 1: What’s a Firewall?
Chapter 2: TCP/IP Quick Start.
Chapter 3: Threats and Principles of Defense.
Chapter 4: Internet Services.
Part II: Firewall Design and Implementation.
Chapter 5: Firewall Architecture.
Chapter 6: Firewall Design.
Chapter 7: IPChains Firewalls.
Chapter 8: The IPTables Facility.
Chapter 9: IPTables Firewall Implementation.
Chapter 10: Advanced IPTables Firewall Implementation.
Part III: Firewall Operation.
Chapter 11: Bastion Host Implementation.
Chapter 12: Testing and Troubleshooting a Firewall.
Chapter 13: Administering a Firewall.
Glossary.
Appendix A: Firewall and Security Web Sites.
Appendix B: Protocol Numbers.
Appendix C: Ports and Services.
Appendix D: ICMP Types and Codes.
Appendix E: Sample Firewall Scripts.
Appendix F: Virtual Private Networks (VPNs).
Index.