|刊登類別:
有類似物品要出售?

LINUX FIREWALLS Attack Detection And Response With Iptables Psad Fwsnort By RASH

狀況:
良好
價格:
US $25.00
大約HK$ 195.20
運費:
免費 經濟運送方式. 查看詳情— 運送
所在地:Olivehurst, California, 美國
送達日期:
估計於 6月25日, 二6月29日, 六之間送達 運送地點 43230
估計運送時間是透過我們的獨家工具,根據買家與物品所在地的距離、所選的運送服務、賣家的運送紀錄及其他因素,計算大概的時間。送達時間會因時而異,尤其是節日。
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:403921820730
上次更新時間: 2022-10-05 03:34:38查看所有版本查看所有版本

物品細節

物品狀況
良好: ...
Book Title
Linux Firewalls: Attack Detection and Response with iptables,
ISBN-10
1593271417
UPC
689145714173
ISBN
9781593271411
Subject Area
Computers
Publication Name
Linux Firewalls : Attack Detection and Response
Item Length
9.2 in
Publisher
No Starch Press, Incorporated
Subject
Operating Systems / Linux, Security / Online Safety & Privacy, Security / General, Security / Networking
Publication Year
2007
Type
Textbook
Format
Perfect
Language
English
Item Height
0.8 in
Author
Michael Rash
Features
New Edition
Item Width
7.1 in
Item Weight
23.1 Oz
Number of Pages
336 Pages

關於產品

Product Information

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: P

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593271417
ISBN-13
9781593271411
eBay Product ID (ePID)
57159365

Product Key Features

Author
Michael Rash
Publication Name
Linux Firewalls : Attack Detection and Response
Format
Perfect
Language
English
Features
New Edition
Subject
Operating Systems / Linux, Security / Online Safety & Privacy, Security / General, Security / Networking
Publication Year
2007
Type
Textbook
Subject Area
Computers
Number of Pages
336 Pages

Dimensions

Item Length
9.2 in
Item Height
0.8 in
Item Width
7.1 in
Item Weight
23.1 Oz

Additional Product Features

LCCN
2006-026679
Intended Audience
Trade
Lc Classification Number
Qa76.9.A25r36 2007
Edition Description
New Edition
Reviews
"If you're building a Linux firewall and want to know what all the bells and whistles are, when you might want to set them off, and how to hook them together, here you go." --;login "This admirable, eminently usable text goes much further than advertised." --Linux User and Developer, Issue 77 "If you run one or more Linux based firewalls, this book will not only help you to configure them securely, it will help you understand how they can be monitored to discover evidence of probes, abuse and denial of service attacks. Readers of this book will gain an understanding of firewall log analysis and how the netfilter firewall can be dramatically enhanced with several open source tools." --Ron Gula, CTO & Co-Founder of Tenable Network Security "The book is easy to read, and chock full of attack vectors and subtle (and not so subtle) iptables configuration tips. This well researched book heightens an average system administrator's awareness to the vulnerabilities in his or her infrastructure, and the potential to find hardening solutions." --Free Software Magazine "Right from the start, the book presented valuable information and pulled me in. Each of the central topics were thoroughly explained in an informative, yet engaging manner. Essentially, I did not want to stop reading. Rating: 9/10" --Slashdot "One of the main reasons Linux Firewalls is a great book is that Mike Rash is an excellent writer. I've read (or tried to read) plenty of books that seemed to offer helpful content, but the author had no clue how to deliver that content in a readable manner. Linux Firewalls makes learning network security an enjoyable experience." --Richard Bejtlich, Tao Security "What really makes this book different from the others I've seen over the years is that the author approaches the subject in a layered method while exposing potential vulnerabilities at each step. (Thank you so VERY much.) So for those that are new to the security game, the book also takes a stab at teaching the basics of network security while teaching you the tools to build a modern firewall." --InfoWorld "Linux Firewalls is a great resource. It provided insight and helpful information into additional tools to get the most out of iptables and to add in additional functionality." --tuxmachines.org "If you or anyone you know is responsible for keeping a secure network, Linux Firewalls is an invaluable resource to have by your side. You will gain a better understanding of attacks, how to use iptables, PSAD, and fwsnort - all in an effort to properly defend and respond to attempted compromises." --LinuxSecurity.com "Michael does a great job of explaining not just how iptables works, but he shows how users gain operational value from using open source tools and techniques, such as visualization, to analyze firewall logs." --Raffael Marty, SecViz
Table of Content
Foreword by Richard Bejtlich Introduction Chapter 1: Care and Feeding of iptables Chapter 2: Network Layer Attacks and Defense Chapter 3: Transport Layer Attacks and Defense Chapter 4: Application Layer Attacks and Defense Chapter 5: Introducing psad: The Port Scan Attack Detector Chapter 6: psad Operations: Detecting Suspicious Traffic Chapter 7: Advanced psad Topics: From Signature Matching to OS Fingerprinting Chapter 8: Active Response with psad Chapter 9: Translating Snort Rules into iptables Rules Chapter 10: Deploying Fwsnort Chapter 11: Combining psad and Fwsnort Chapter 12: Port-Knocking vs. Single Packet Authorization Chapter 13: Introducing fwknop Chapter 14: Visualizing iptables Logs Appendix A: Attack Spoofing Appendix B: A Complete fwsnort Script
Copyright Date
2007
Dewey Decimal
005.8
Dewey Edition
22
Illustrated
Yes

賣家提供的物品說明

battle_bunny

battle_bunny

100% 正面信用評價
已賣出 1.25 萬 件物品

詳盡賣家評級

過去 12 個月的平均評級

說明準確
5.0
運費合理
5.0
運送速度
5.0
溝通
5.0

賣家信用評價 (5,277)

h***t (724)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Item as described, super quick shipping, would buy from again. Thanks!!!
6***l (534)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
So cute!!
n***o (449)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
Perfect ❤️ Thank you!!! Great seller ⭐️