Firewalls and internet security: repelling the wily hacker /

Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy ac...

Full description

Bibliographic Details
Main Author: Cheswick, William R. (autor)
Other Authors: Bellovin, Steven M. (autor), Rubin, Aviel D. (autor)
Format: Kit
Language:Spanish
English
Published: Boston: Addison-Wesley, 2003.
Edition:Segunda edición.
Series:Addison-Wesley Professional Computing Series
Subjects:

MARC

LEADER 00000cac a2200000 i 4500
003 Ucuenca
005 20230308182551.0
006 a||||fr|||| 001 0
007 ta
008 010121t2003 xxu fr|||| 001|||spa|a
999 |c 60117  |d 60117 
020 |a 0-201-63466--X 
040 |a UCuenca-cdrjbv  |b spa  |c UCuenca  |e rda 
041 0 |a eng 
082 0 |2 22  |a 005.8  |c 108458 
100 1 |9 100409  |a Cheswick, William R.  |e autor 
245 1 |a Firewalls and internet security:   |b repelling the wily hacker /   |c William R. Cheswick, Steven M. Bellovin y Aviel D. Rubin. 
250 |a Segunda edición. 
264 1 |a Boston:   |b Addison-Wesley,   |c 2003. 
264 4 |c ©2003 
300 |a xx; 433 páginas:   |c 23 cm 
336 |2 rdacontent  |a texto  |b txt 
337 |2 rdamedia  |a no mediado  |b n 
338 |2 rdacarrier  |a volumen  |b nc 
490 |a Addison-Wesley Professional Computing Series 
504 |a incl. bibind. 
505 1 |a The threats -- Safer tools and services -- Firewalls and VPNs -- Protecting an organization -- Lessons learned. 
520 3 |a Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it. In addition, there is vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security. With Firewalls and Internet Security, anyone will be well equipped to provide their organization with effective protection from the wily Internet hacker. 
650 1 0 |a Programación informática  |9 7362 
650 1 7 |9 7361  |a Informática 
700 1 |a Bellovin, Steven M.  |e autor  |9 100410 
700 1 |a Rubin, Aviel D.  |e autor  |9 100411 
852 |a UC-CDJBV  |f Compra  |l 1  |m General  |p 20101213  |q 50,00  |r 2  |t 108458  |y 305315  |b 0  |d CDRC  |e CDRC  |g 005.8 PRIMER PISO  |z 2010-01-21 
942 |c CR  |2 ddc  |z ivan.verdugo@ucuenca.edu.ec