Firewalls

Firewalls
Author: National Computer Security Association
Publisher:
Total Pages:
Release: 1997
Genre: Computer networks
ISBN:

International Banking and Information Security Conference, 1997

International Banking and Information Security Conference, 1997
Author: Don Krysakowski
Publisher: DIANE Publishing
Total Pages: 377
Release: 1998-06
Genre:
ISBN: 0788171534

Proceedings of a conference on the risks to the banking industry posed by its subscribing to a variety of new information-based technologies and risks for the entire international banking industry. The conference explores what risks do exist and what steps are being taken to reduce the risks. Includes: technology versus security: challenges to modern banking; successful on-line banking: a true story; a study into financial infrastructure vulnerabilites; introducing "trust" and back-end protection to virtual bankers; information security basics in banking for the non-technician: a four-part tutorial, and much more.

CyberRisk '96 Proceedings

CyberRisk '96 Proceedings
Author: David M. Harper
Publisher: DIANE Publishing
Total Pages: 312
Release: 1998-03
Genre: Computer networks
ISBN: 9780788138003

Contents: computer monitoring and information policy: lessons learned from the Privacy for Consumers and Workers Act; ethical online marketing: using targeted direct E-mail in a politically correct way; intelligent agents in cyberspace; intellectual property rights: employer responsibilities; restricting Web access in the workplace: pornography and games at work, and more. Extensive appendices including: policy manuals on E-mail, internet use, software policy, employee monitoring, computer ethics, privacy, foreign laws affecting DP and transborder data flows, copyright, and much more.

Firewalls

Firewalls
Author: John R. Vacca
Publisher: Elsevier
Total Pages: 449
Release: 2004-12-21
Genre: Computers
ISBN: 0080491324

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall. · Install and configure proxy-based and stateful-filtering firewalls · Protect internal IP addresses with NAT and deploy a secure DNS architecture · Develop an Internet/intranet security policy to protect your organization's systems and data · Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

Firewalls and Internet Security

Firewalls and Internet Security
Author: William R. Cheswick
Publisher: Addison-Wesley Professional
Total Pages: 466
Release: 2003
Genre: Computers
ISBN: 9780201634662

Introduces the authors' philosophy of Internet security, explores possible attacks on hosts and networks, discusses firewalls and virtual private networks, and analyzes the state of communication security.

Building Internet Firewalls

Building Internet Firewalls
Author: Elizabeth D. Zwicky
Publisher: "O'Reilly Media, Inc."
Total Pages: 897
Release: 2000-06-26
Genre: Computers
ISBN: 0596551886

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.

Firewalls and Internet Security Conference, 1996

Firewalls and Internet Security Conference, 1996
Author: Peter Tippett
Publisher: DIANE Publishing
Total Pages: 329
Release: 1998-06
Genre:
ISBN: 0788171577

The first Nat. Computer Security Assoc. conf. dedicated to the exchange of ideas, policies & methodologies for implementing practical internet security. Brings together experts to address the key issues in this rapidly evolving field. Includes: the electronic intrusion threat on public networks; identifying network security vulnerabilities; the Internet & security; establishing an Internet security policy; evaluating & testing firewalls; malicious software on the Internet; security on the World Wide Web; social engineering: the non-technical threat; Sterling Software; IBM: NetSP Secured Network Gateway, & much more.

Internet Security Made Easy

Internet Security Made Easy
Author: Douglas Schweitzer
Publisher: Amacom Books
Total Pages: 306
Release: 2002
Genre: Business & Economics
ISBN: 9780814471425

Schweitzer offers this nontechnical, step-by-step guide to help computer users of all levels to better understand how the Internet works, and how to enjoy the benefits of the Internet while still maintaining computer security. Topics include secure Web browsing, cookie monitoring and removal, installing antivirus software, e-mail attachments and spam, securing a Web server, public key infrastructure, secure remote access and virtual private networks, and handling hacker attacks and cybercrime. The author is a vice president at an actuarial consulting firm, where he is responsible for corporate network design and security. Annotation copyrighted by Book News Inc., Portland, OR.