Red Hat Linux Firewalls Upplaga 1
Your Official Red Hat Linux Guide to Firewalls Reviewed and approved by the experts at Red Hat, this comprehensive reference guide gives you all the tools to construct firewalls on a Red Hat server that will lock out intruders and defend your network against attacks. Red Hat Linux expert and IT professor Bill McCarty begins by giving you a solid foundation in security technology and philosophy. You’ll examine the importance of perimeter security and the central role packet-filtering firewalls play, understand the network traffic patterns associated with common Internet services, and explore ways to develop firewall policies that permit, prohibit, or restrict use. With this groundwork in place, you then discover how to cost-justify, design, implement, test, and operate packet-filtering firewalls constructed with Red Hat Linux. You’ll also gain valuable information about related topics, such as implementing bastion hosts and detecting network intrusion. This guidebook arms you with everything you need to secure your Red Hat Linux system with state-of-the-art firewalls. Proven Security Solutions with Red Hat Linux Firewalls Examine the migration from ipchains in earlier releases of Red Hat Linux to the iptables in Red Hat Linux 8 Manage iptable log files Customize firewalls produced with lokkit Learn how to use Red Hat Linux with the traditional bastion host firewall setup Discover IP masquerading, network address translation, and other advanced Red Hat firewall features Study firewalls and firewall administration techniques that work "out of the box" on Red Hat Linux systems Gain a working knowledge of firewall design, implementation, and administration "Learn how to protect your network from evil attackers, and from yourself, by making a firewall using Red Hat Linux and other open source software."
–Mark J. Cox, Senior Director of Engineering, Red Hat
Upplaga: 1a upplagan
Utgiven: 2002
ISBN: 9780764524639
Förlag: John Wiley & Sons
Format: Häftad
Språk: Engelska
Sidor: 552 st
Your Official Red Hat Linux Guide to Firewalls Reviewed and approved by the experts at Red Hat, this comprehensive reference guide gives you all the tools to construct firewalls on a Red Hat server that will lock out intruders and defend your network against attacks. Red Hat Linux expert and IT professor Bill McCarty begins by giving you a solid foundation in security technology and philosophy. You’ll examine the importance of perimeter security and the central role packet-filtering firewalls play, understand the network traffic patterns associated with common Internet services, and explore ways to develop firewall policies that permit, prohibit, or restrict use. With this groundwork in place, you then discover how to cost-justify, design, implement, test, and operate packet-filtering firewalls constructed with Red Hat Linux. You’ll also gain valuable information about related topics, such as implementing bastion hosts and detecting network intrusion. This guidebook arms you with everything you need to secure your Red Hat Linux system with state-of-the-art firewalls. Proven Security Solutions with Red Hat Linux Firewalls Examine the migration from ipchains in earlier releases of Red Hat Linux to the iptables in Red Hat Linux 8 Manage iptable log files Customize firewalls produced with lokkit Learn how to use Red Hat Linux with the traditional bastion host firewall setup Discover IP masquerading, network address translation, and other advanced Red Hat firewall features Study firewalls and firewall administration techniques that work "out of the box" on Red Hat Linux systems Gain a working knowledge of firewall design, implementation, and administration "Learn how to protect your network from evil attackers, and from yourself, by making a firewall using Red Hat Linux and other open source software."
–Mark J. Cox, Senior Director of Engineering, Red Hat
Varje vecka tillkommer tusentals nya säljare. Bevaka boken så får du meddelande när den finns tillgänglig igen.