Here is the step-by-step guide to setting up & using firewall security systems-as well as other products-that UNIX programmers have sorely needed. It not only describes what a firewall can do, but also, importantly, what it cannot do. Practically & authoritative, the book delivers details on how to secure internal networks from Internet intrusion... how to customize firewalls & network configuration files to suit specific security needs... & how to configure & use the controversial SATAN software, as well as security tools available via Anonymous FTP. In addition, it sheds light on emerging technologies such as Kerberos (a primary standard for authenticating identities developed at MIT to develop its own network).
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever.
Keep your network up to date with the latest TCP/IP standards and protocols Now that IPv4 and IPv6 have joined and coexist, TCP/IP administration and standards have had quite a makeover. This book helps you catch up!
When it comes to teaching computer professionals how to plan for, use, operate, and maintain a TCP/IP network and associated services, Dr. Sidnie Feit literally "wrote the Book". Now, fully...
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet.
The book includes many homework exercises, and supplementary material for instructors is available. The book is aimed at students of electrical and computer engineering and students of computer science taking courses in networking.
For more information about z/OS Communications Server base functions, standard applications, and high availability, see the other following volumes in the series: IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base ...
Albitz, Paul, Matt Larson, and Cricket Liu. DNS on Windows NT. Sebastopol, CA: O'Reilly and Associates, 1998. This version of the book provides an explanation of the details of how Internet name service works on Windows NT.
All systems administrators and IT security managers will find Practical Internet Security an essential practical resource. This book is also suitable for graduate-level students in computer science.
This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances the ability to create and deploy secure architectures.
Managing TCP/IP Networks Techniques, Tools and Security Considerations Gilbert Held, 4-Degree Consulting, Macon, Georgia, USA Focuses on the techniques, tools, diagnostic testing, and security Addresses the practical methods to...