Firewalls and Internet security : repelling the wily hacker /

Saved in:
Bibliographic Details
Author / Creator:Cheswick, William R.
Imprint:Reading, Mass. : Addison-Wesley, c1994.
Description:xiv, 306 p. : ill. ; 24 cm.
Language:English
Series:Addison-Wesley professional computing series
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/1702742
Hidden Bibliographic Details
Other authors / contributors:Bellovin, Steven M.
ISBN:0201633574 (recycled paper)
Notes:Includes bibliographical references (p. 257-276) and index.

MARC

LEADER 00000nam a2200000 a 4500
001 1702742
003 ICU
005 20030518000200.0
008 950126s1994 maua b 001 0 eng u
010 |a  94010747  
020 |a 0201633574 (recycled paper) 
035 |a (ICU)BID19547341 
040 |a DLC  |c DLC  |d DLC  |d OrLoB-B  |d OCoLC 
041 0 |a eng 
050 0 0 |a TK5105.875.I57  |b C44 1994 
082 0 0 |a 005.8  |2 20 
100 1 |a Cheswick, William R.  |0 http://id.loc.gov/authorities/names/n94024104  |1 http://viaf.org/viaf/92160742 
245 1 0 |a Firewalls and Internet security :  |b repelling the wily hacker /  |c William R. Cheswick, Steven M. Bellovin. 
260 |a Reading, Mass. :  |b Addison-Wesley,  |c c1994. 
300 |a xiv, 306 p. :  |b ill. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Addison-Wesley professional computing series 
504 |a Includes bibliographical references (p. 257-276) and index. 
505 2 0 |g 1.  |t Introduction --  |g 2.  |t An Overview of TCP/IP --  |g 3.  |t Firewall Gateways --  |g 4.  |t How to Build an Application-Level Gateway --  |g 5.  |t Authentication --  |g 6.  |t Gateway Tools --  |g 7.  |t Traps, Lures, and Honey Pots --  |g 8.  |t The Hacker's Workbench --  |g 9.  |t Classes of Attacks --  |g 10.  |t An Evening with Berferd --  |g 11.  |t Where the Wild Things Are: A Look at the Logs --  |g 12.  |t Legal Considerations --  |g 13.  |t Secure Communications over Insecure Networks --  |g 14.  |t Where Do We Go from Here? --  |t A Useful Free Stuff --  |t B TCP and UDP Ports --  |t C Recommendations to Vendors. 
650 0 |a Internet.  |0 http://id.loc.gov/authorities/subjects/sh92002816 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 7 |a Firewalls (Computer security)  |2 fast  |0 http://id.worldcat.org/fast/fst00925719 
700 1 |a Bellovin, Steven M.  |0 http://id.loc.gov/authorities/names/n94024108  |1 http://viaf.org/viaf/92160630 
901 |a ToCBNA 
903 |a HeVa 
903 |a Hathi 
035 |a (OCoLC)30110028 
929 |a cat 
999 f f |i c9a37a4d-edfd-52e4-bfaf-314fc88fc7f3  |s a61d155c-b9dd-55c1-b827-b51dee661acc 
928 |t Library of Congress classification  |a TK5105.875.I57C440 1994  |l JCL  |c JCL-Sci  |i 2832986 
927 |t Library of Congress classification  |a TK5105.875.I57C440 1994  |l JCL  |c JCL-Sci  |e CRERAR  |b 42218426  |i 3206900