Firewalls and Internet security : repelling the wily hacker /

Saved in:
Bibliographic Details
Author / Creator:Cheswick, William R.
Imprint:Reading, Mass. : Addison-Wesley, c1994.
Description:xiv, 306 p. : ill. ; 24 cm.
Language:English
Series:Addison-Wesley professional computing series
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/1702742
Hidden Bibliographic Details
Other authors / contributors:Bellovin, Steven M.
ISBN:0201633574 (recycled paper)
Notes:Includes bibliographical references (p. 257-276) and index.
Table of Contents:
  • Preface
  • I. Getting Started
  • 1. Introduction
  • Why Security?
  • Picking a Security Policy
  • Strategies for a Secure Network
  • The Ethics of Computer Security
  • Warning
  • 2. An Overview of TCP/IP
  • The Different Layers
  • Routers and Routing Protocols
  • The Domain Name System
  • Standard Services
  • RPC
  • Based Protocols
  • File Transfer Protocols
  • The r Commands
  • Information Services
  • The X11 System
  • Patterns of Trust
  • II. Building Your Own Firewall
  • 3. Firewall Gateways
  • Firewall Philosophy
  • Situating Firewalls
  • Packet-Filtering Gateways
  • Application-Level Gateways
  • Circuit-Level Gateways
  • Supporting Inbound Services
  • Tunnels Good and Bad
  • Joint Ventures
  • What Firewalls Can't Do
  • 4. How to Build an Application-Level Gateway
  • Policy
  • Hardware Configuration Options
  • Initial Installation
  • Gateway Tools
  • Installing Services
  • Protecting the Protectors
  • Gateway Administration
  • Safety Analysis (Why Our Setup Is Secure and Fail-Safe)
  • Performance
  • The TIS Firewall Toolkit
  • Evaluating Firewalls
  • Living Without a Firewall
  • 5. Authentication
  • User Authentication
  • Host-to-Host Authentication
  • 6. Gateway Tools
  • Proxylib
  • Syslog
  • Watching the Network: Tcpdump and Friends
  • Adding Logging to Standard Daemons
  • 7. Traps, Lures, and Honey Pots
  • What to Log
  • Dummy Accounts
  • Tracing the Connection
  • 8. The Hacker's Workbench
  • Introduction
  • Discovery
  • Probing Hosts
  • Connection Tools
  • Routing Games
  • Network Monitors
  • Metastasis
  • Tiger Teams
  • Further Reading
  • III. A Book Back
  • 9. Classes of Attacks
  • Stealing Passwords
  • Social Engineering
  • Bugs and Backdoors
  • Authentication Failures
  • Protocol Failures
  • Information Leakage
  • Denial-of-Service
  • 10. An Evening with Berferd
  • Introduction
  • Unfriendly Acts
  • An Evening with Berferd
  • The Day After
  • The Jail
  • Tracing Berferd
  • Berferd Comes Home
  • 11. Where the Wild Things Are: A Look at the Logs
  • A Year of Hacking
  • Proxy Use
  • Attack Sources
  • Noise on the Line
  • IV. Odds And Ends
  • 12. Legal Considerations
  • Computer Crime Statutes
  • Log Files as Evidence
  • Is Monitoring Legal?
  • Tort Liability Considerations
  • 13. Secure Communications over Insecure Networks
  • An Introduction to Cryptography
  • The Kerberos Authentication System
  • Link-Level Encryption
  • Network- and Transport-Level Encryption
  • Application-Level Encryption
  • 14. Where Do We Go from Here?
  • Appendix A. Useful Free Stuff
  • Building Firewalls
  • Network Management and Monitoring Tools
  • Auditing Packages
  • Cryptographic Software
  • Information Sources
  • Appendix B. TCP and UDP Ports
  • Fixed Ports
  • MBone Usage
  • Appendix C. Recommendations to Vendors
  • Everyone
  • Hosts
  • Routers
  • Protocols
  • Firewalls
  • Bibliography
  • List of Bombs
  • Index