Saved in:
Main Authors: | , , |
---|---|
Format: | Book |
Language: | English |
Published: |
Beijing u.a.
O'Reilly
2000
|
Edition: | 2. ed. |
Subjects: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009094498&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Item Description: | 1. Aufl. u.d.T.: Chapman, D. Brent: Building internet firewalls |
Physical Description: | XXI, 869 S. graph. Darst. |
ISBN: | 1565928717 |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013336245 | ||
003 | DE-604 | ||
005 | 20041221 | ||
007 | t| | ||
008 | 000911s2000 xx d||| |||| 00||| eng d | ||
016 | 7 | |a 959582347 |2 DE-101 | |
020 | |a 1565928717 |9 1-56592-871-7 | ||
035 | |a (OCoLC)54809654 | ||
035 | |a (DE-599)BVBBV013336245 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-29T |a DE-739 |a DE-634 |a DE-83 |a DE-522 |a DE-188 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
100 | 1 | |a Zwicky, Elizabeth D. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Building Internet firewalls |c Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman |
250 | |a 2. ed. | ||
264 | 1 | |a Beijing u.a. |b O'Reilly |c 2000 | |
300 | |a XXI, 869 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a 1. Aufl. u.d.T.: Chapman, D. Brent: Building internet firewalls | ||
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Firewalls |2 gtt | |
650 | 7 | |a Internet |2 gtt | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a TCP/IP |0 (DE-588)4197538-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Firewall |0 (DE-588)4386332-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Firewall |0 (DE-588)4386332-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a TCP/IP |0 (DE-588)4197538-8 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
700 | 1 | |a Cooper, Simon |e Verfasser |4 aut | |
700 | 1 | |a Chapman, D. Brent |e Verfasser |4 aut | |
775 | 0 | 8 | |i Paralle Sprachausgabe |n deutsch |a Chapman, D. Brent |t Einrichten von Internet firewalls |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009094498&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009094498 |
Record in the Search Index
DE-BY-TUM_call_number | 0102 DAT 460f 2001 A 36869 |
---|---|
DE-BY-TUM_katkey | 1152316 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040010588280 |
_version_ | 1825800920260149248 |
adam_text |
Titel: Building internet firewalls
Autor: Zwicky, Elizabeth D
Jahr: 2000
Table of Contents
Preface.xiii
I. Network Security.1
1. Why Internet Firewalls?.3
What Are You Trying to Protect? . 4
What Are You Trying to Protect Against? . 7
Who Do You Trust? . 16
How Can You Protect Your Site? . 17
What Is an Internet Firewall? . 21
Religious Arguments . 28
2. Internet Services.33
Secure Services and Safe Services . 35
The World Wide Web . 35
Electronic Mail and News . 40
File Transfer, File Sharing, and Printing . 43
Remote Access . 48
Real-Time Conferencing Services . 51
Naming and Directory Services . 52
Authentication and Auditing Services . 54
Administrative Services .55
Databases. 58
Games . 58
vi
Table of Contents
3. Security Strategies .
Least Privilege .
Defense in Depth .
Choke Point.
Weakest Link . ^
64
Fail-Safe Stance .
Universal Participation . ^
Diversity of Defense . ^
Simplicity . ^
Security Through Obscurity. 7i
II. Building Firewalls. 73
4. Packets and Protocols . 75
What Does a Packet Look Like? . 75
IP. 79
1 Protocols Above IP . £5
Protocols Below IP .93
Application Layer Protocols.94
IP Version 6 .i.94
Non-IP Protocols .96
Attacks Based on Low-Level Protocol Details .97
5. Firewall Technologies.102
Some Firewall Definitions. 102
Packet Filtering. 104
Proxy Services . 110
Network Address Translation . 114
Virtual Private Networks . 119
6. Firewall Architectures.122
Single-Box Architectures.122
Screened Host Architectures.126
Screened Subnet Architectures .128
Architectures with Multiple Screened Subnets . 133
Variations on Firewall Architectures .13 7
Terminal Servers and Modem Pools . 148
Internal Firewalls.^49
Table of Contents_vii
7. Firewall Design.157
Define Your Needs . 157
Evaluate the Available Products . 159
Put Everything Together. 162
8. Packet Filtering.165
What Can You Do with Packet Filtering? . 166
Configuring a Packet Filtering Router. 171
What Does the Router Do with Packets? . 173
Packet Filtering Tips and Tricks . 178
Conventions for Packet Filtering Rules . 180
Filtering by Address . 183
Filtering by Service . 185
Choosing a Packet Filtering Router. 190
Packet Filtering Implementations for General-Purpose Computers.203
Where to Do Packet Filtering .214
What Rules Should You Use? .216
Putting It All Together .216
9. Proxy Systems.224
Why Proxying? .225
How Proxying Works .226
Proxy Server Terminology.231
Proxying Without a Proxy Server.232
Using SOCKS for Proxying .233
Using the TIS Internet Firewall Toolkit for Proxying.237
Using Microsoft Proxy Server .238
What If You Can't Proxy? .239
10. Bastion Hosts .241
General Principles . 242
Special Kinds of Bastion Hosts.243
Choosing a Machine .244
Choosing a Physical Location.248
Locating Bastion Hosts on the Network .249
Selecting Services Provided by a Bastion Host .250
Disabling User Accounts on Bastion Hosts .253
Building a Bastion Host.255
Securing the Machine .256
Disabling Nonrequired Services .259
viii
Table of Contents
Operating the Bastion Host .
Protecting the Machine and Backups
11. Unix and Linux Bastion Hosts
Which Version of Unix? .
Securing Unix .
Disabling Nonrequired Services .
Installing and Modifying Services .
Reconfiguring for Production .
Running a Security Audit.
12. Windows NT and Windows 2000 Bastion Hosts.297
Approaches to Building Windows NT Bastion Hosts . 297
Which Version of Windows NT? . 298
Securing Windows NT . 299
Disabling Nonrequired Services .301
Installing and Modifying Services .313
III. Internet Services.315
13- Internet Services and Firewalls .317
Attacks Against Internet Services . 319
Evaluating the Risks of a Service . 327
Analyzing Other Protocols. 334
What Makes a Good Firewalled Service? . 336
Choosing Security-Critical Programs . 339
Controlling Unsafe Configurations . 347
14. Intermediary Protocols .
Remote Procedure Call (RPC) .
Distributed Component Object Model (DCOM) .
NetBIOS over TCP/IP (NetBT) .
Common Internet File System (CIFS) and Server
Message Block (SMB) .
Common Object Request Broker Architecture (CORBA)
and Internet Inter-Orb Protocol (HOP) .
ToolTalk .
Transport Layer Security (TLS) and Secure Socket Layer (SSL)
The Generic Security Services API (GSSAPI).
IPsec .
273
273
275
278
288
. 291
. 295
349
349
358
359
, 361
365
. 367
. 368
. 373
• 373
Table of Contents_fx
Remote Access Service (RAS) .377
Point-to-Point Tunneling Protocol (PPTP).378
Layer 2 Transport Protocol (L2TP) .381
15. The World Wide Web.384
HTTP Server Security .385
HTTP Client Security. 390
HTTP.397
Mobile Code and Web-Related Languages . 406
Cache Communication Protocols . 412
Push Technologies . 415
RealAudio and RealVideo . 417
Gopher and WAIS . 419
16. Electronic Mail and News .423
Electronic Mail. 423
Simple Mail Transfer Protocol (SMTP) . 430
Other Mail Transfer Protocols . 441
Microsoft Exchange. 442
Lotus Notes and Domino. 443
Post Office Protocol (POP). 445
Internet Message Access Protocol (IMAP) . 448
Microsoft Messaging API (MAPI). 450
Network News Transfer Protocol (NNTP) . 450
17. File Transfer, File Sharing, and Printing .454
File Transfer Protocol (FTP) . 455
Trivial File Transfer Protocol (TFTP) . 468
Network File System (NFS). 470
File Sharing for Microsoft Networks . 479
Summary of Recommendations for File Sharing . 482
Printing Protocols . 483
Related Protocols . 487
18. Remote Access to Hosts.488
Terminal Access (Telnet) . 488
Remote Command Execution. 491
Remote Graphical Interfaces .507
X
Table of Contents
19. Real-Time Conferencing Services.520
Internet Relay Chat (IRC).
ICQ.523
talk .525
Multimedia Protocols .
533
NetMeeting .
Multicast and the Multicast Backbone (MBONE) .535
20. Naming and Directory Services.539
Domain Name System (DNS) .539
Network Information Service (NIS).563
NetBIOS for TCP/IP Name Service and Windows Internet
Name Service.565
The Windows Browser .576
Lightweight Directory Access Protocol (LDAP) .583
Active Directory .585
Information Lookup Services .586
21. Authentication and Auditing Services.591
What Is Authentication? .592
Passwords .596
Authentication Mechanisms. 600
Modular Authentication for Unix . 604
Kerberos . 609
NTLM Domains . 615
Remote Authentication Dial-in User Service (RADIUS). 622
TACACS and Friends . 625
Auth and identd . 627
22. Administrative Services. 630
System Management Protocols. 630
Routing Protocols .g37
Protocols for Booting and Boot-Time Configuration . 644
ICMP and Network Diagnostics . 647
Network Time Protocol (NTP) .654
File Synchronization.$^8
Mostly Harmless Protocols .
Table of Contents _xi
23. Databases and Games.664
Databases. 664
Games . 678
24. Two Sample Firewalls .681
Screened Subnet Architecture . 681
Merged Routers and Bastion Host Using General-Purpose Hardware . 704
IV Keeping Your Site Secure.721
25. Security Policies.723
Your Security Policy. 724
Putting Together a Security Policy . 731
Getting Strategic and Policy Decisions Made . 734
What If You Can't Get a Security Policy?. 741
26. Maintaining Firewalls.742
Housekeeping . 742
Monitoring Your System . 746
Keeping up to Date . 758
How Long Does It Take? . 762
When Should You Start Over?. 762
27. Responding to Security Incidents.764
Responding to an Incident . 764
What to Do After an Incident. 774
Pursuing and Capturing the Intruder . 775
Planning Your Response . 778
Being Prepared. 787
V Appendixes.795
A. Resources.797
B. Tools.813
C. Cryptography .823
Index.849 |
any_adam_object | 1 |
author | Zwicky, Elizabeth D. Cooper, Simon Chapman, D. Brent |
author_facet | Zwicky, Elizabeth D. Cooper, Simon Chapman, D. Brent |
author_role | aut aut aut |
author_sort | Zwicky, Elizabeth D. |
author_variant | e d z ed edz s c sc d b c db dbc |
building | Verbundindex |
bvnumber | BV013336245 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 273 ST 276 ST 277 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)54809654 (DE-599)BVBBV013336245 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV013336245</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20041221</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">000911s2000 xx d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">959582347</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1565928717</subfield><subfield code="9">1-56592-871-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54809654</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013336245</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zwicky, Elizabeth D.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building Internet firewalls</subfield><subfield code="c">Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing u.a.</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 869 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Aufl. u.d.T.: Chapman, D. Brent: Building internet firewalls</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cooper, Simon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chapman, D. Brent</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="775" ind1="0" ind2="8"><subfield code="i">Paralle Sprachausgabe</subfield><subfield code="n">deutsch</subfield><subfield code="a">Chapman, D. Brent</subfield><subfield code="t">Einrichten von Internet firewalls</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009094498&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009094498</subfield></datafield></record></collection> |
id | DE-604.BV013336245 |
illustrated | Illustrated |
indexdate | 2025-03-05T15:01:01Z |
institution | BVB |
isbn | 1565928717 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009094498 |
oclc_num | 54809654 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-29T DE-739 DE-634 DE-83 DE-522 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-29T DE-739 DE-634 DE-83 DE-522 DE-188 |
physical | XXI, 869 S. graph. Darst. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | O'Reilly |
record_format | marc |
spellingShingle | Zwicky, Elizabeth D. Cooper, Simon Chapman, D. Brent Building Internet firewalls Computerbeveiliging gtt Firewalls gtt Internet gtt Computer networks Security measures Firewalls (Computer security) Internet Security measures TCP/IP (DE-588)4197538-8 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Firewall (DE-588)4386332-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4197538-8 (DE-588)4011144-1 (DE-588)4054790-5 (DE-588)4070085-9 (DE-588)4308416-3 (DE-588)4386332-2 (DE-588)4010452-7 |
title | Building Internet firewalls |
title_auth | Building Internet firewalls |
title_exact_search | Building Internet firewalls |
title_full | Building Internet firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman |
title_fullStr | Building Internet firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman |
title_full_unstemmed | Building Internet firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman |
title_short | Building Internet firewalls |
title_sort | building internet firewalls |
topic | Computerbeveiliging gtt Firewalls gtt Internet gtt Computer networks Security measures Firewalls (Computer security) Internet Security measures TCP/IP (DE-588)4197538-8 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Firewall (DE-588)4386332-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Computerbeveiliging Firewalls Internet Computer networks Security measures Firewalls (Computer security) Internet Security measures TCP/IP Datensicherung Sicherheit Rechnernetz Firewall Computerkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009094498&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT zwickyelizabethd buildinginternetfirewalls AT coopersimon buildinginternetfirewalls AT chapmandbrent buildinginternetfirewalls |
Table of Contents
Order paper/chapter scan
Order paper/chapter scan
Branch Library Mathematics & Informatics
Call Number: | 0102 DAT 460f 2001 A 36869 |
---|---|
Copy 1 | Available for loan On Shelf |