Firewalls: Jumpstart for Network and Systems Administrators

Author: John R. Vacca,Scott Ellis
ISBN: 1555582974/9781555582975
Pages: 448
Publication Date: 2004-12-06

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.

· Install and configure proxy-based and stateful-filtering firewalls
· Protect internal IP addresses with NAT and deploy a secure DNS architecture
· Develop an Internet/intranet security policy to protect your organization's systems and data
· Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures
Download

Posted in Label: | 0 komentar

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Author: Michael Rash
ISBN: 1593271417/9781593271411
Pages: 336
Publication Date: 2007-09-15

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

  • Download

    Posted in Label: | 0 komentar

    Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)

    Author: David Hucaby
    ISBN: 1587054574/9781587054570
    Pages: 912
    Publication Date: 2007-08-09

    Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM).

    Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation.

    Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.

    Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.

    “Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco.”

    –Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco

    David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.

    • Learn about the various firewall models, user interfaces, feature sets, and configuration methods
    • Understand how a Cisco firewall inspects traffic
    • Configure firewall interfaces, routing, IP addressing services, and IP multicast support
    • Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
    • Authenticate, authorize, and maintain accounting records for firewall users
    • Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
    • Define security policies that identify and act on various types of traffic with the Modular Policy Framework
    • Increase firewall availability with firewall failover operation
    • Understand how firewall load balancing works
    • Generate firewall activity logs and learn how to analyze the contents of the log
    • Verify firewall operation and connectivity and observe data passing through a firewall
    • Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module

    This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

    Category: Networking: Security

    Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls

    $60.00 USA / $69.00 CAN

    Download

    Posted in Label: | 0 komentar

    iText in Action: Creating and Manipulating PDF

    Author: Bruno Lowagie
    ISBN: 1932394796/9781932394795
    Pages: 656
    Publication Date: 2006-12-08

    Imagine a publisher who wants to "stamp" his ebooks on the fly with the name of the buyer (to discourage sharing). Such a publisher would (and we know one who does) use iText for the task. Developers looking to enhance web- and other applications with dynamic PDF document generation and/or manipulation will find this book unique in content and readability. Based on ongoing examples that encourage learning "in action," they will finally understand PDF and learn how to build applications that produce professional, high-quality PDF documents. While the basic functionality of iText is easy to acquire, this book lowers the learning curve for more advanced functionality. It explains how to use iText to create/manipulate PDF documents on-the-fly in one or more of the following situations:

  • Due to time or size, the PDF documents can't be produced manually
  • The content of the document must be calculated or based on user input.
  • The content needs to be customized or personalized.
  • The PDF content needs to be served in a web environment.
  • Documents are to be created in "batch process" mode.

    All the examples are written in Java, but they can be easily adapted to .NET by developers using one of the .NET ports: iTextSharp (C#) or iText.NET (#J). While iText is a free Java library and the examples are written from the point of view of the Java developer, nine out of ten examples can be run by .NET developers with only minimal changes.

  • Download

    Posted in Label: | 0 komentar

    Real World ASP.NET: Building a Content Management System

    Author: Stephen R.G. Fraser
    ISBN: 1590590244/9781590590249
    Pages: 522
    Publication Date: 0000-00-00

    Real World ASP.NET: Building a Content Management System provides Web developers with a cost-effective way to develop a content management system within Microsoft's .NET Framework. Unlike other .NET books on ASP.NET that teach technologies on a piecemeal basis, this book explains the underlying technologies and also shows how they are integrated into a complete ASP.NET application suitable for many organizations. Complete source code written in C# and ASP.NET is included, which will enable Web developers to create a dynamic content site at a fraction of the cost of a commercial solution. Readers will learn about the following:

    • Content management system: This system used to manage the content of a Web site consists of the content management, metacontent management, and content delivery applications.
    • C# and ASP.NET: These underlying technologies are introduced and then applied extensively.
    • ADO.NET: All aspects relevant to dynamic content management are covered.
    • XML: Extensible Markup Language (XML) is introduced and then applied in the programmatic updating of the config.web file.
    • Authentication, authorization, and encryption: These topics are discussed in the book, especially with regard to protected content and system administration.
    • Personalization: Many key technologies are used to make the CMS solution truly user-friendly.

      Real-World ASP.NET: Building a Content Management System is the complete hands-on guide to mastering the art of CMSs and Web site development using the .NET Framework.

    Download

    Posted in Label: | 0 komentar

    Visual C# .NET Programming

    Author: Harold Davis
    ISBN: 0782140467/9780782140460
    Pages: 512
    Publication Date: 2002-08-09

    C# is the hot new language from Microsoft, designed specifically for the new .NET platform for application development. Visual C# .NET Programming provides a comprehensive introduction to the principals of C# programming but has a different emphasis from many other books. Because the language is so well-suited to the creation of Web Services, author Harold Davis emphasizes this application throughout the book. In the beginning of the book, you create a simple Web Service; by the end, you will be able to create a much more complex Web Service. You also learn the fundamentals of object-oriented programming with C#, creating user interfaces for Windows applications, working with files and directories, and working with XML and ADO.NET. Davis has an established reputation as a teacher of introductory programming concepts. This book is the perfect companion to his Visual Basic .NET Programming.
    Download

    Posted in Label: | 0 komentar

    Developing Drivers with the Windows Driver Foundation

    Author: Penny Orwick,Guy Smith
    ISBN: 0735623740/9780735623743
    Pages: 928
    Publication Date: 2007-04-25

    Master the features and capabilities of the new Windows Driver Foundation--with guidance straight from the experts. The new Windows Driver Foundation, based on the Windows Driver Kit, simplifies driver development with new models and tools familiar to developers who work with Microsoft Visual Studio®. This in-depth guide delivers authoritative guidance on these new models, straight from the teams at Microsoft who developed the Windows Driver Foundation and based on feedback from beta testers. You'll get advance insights, practical advice, and best practices for using the Windows Driver Foundation--helping you reach new levels of proficiency. Includes code samples in Microsoft Visual C++.
    Download

    Posted in Label: | 0 komentar