Matches in Harvard for { <http://id.lib.harvard.edu/aleph/005031248/catalog> ?p ?o. }
Showing items 1 to 26 of
26
with 100 items per page.
- catalog contributor b7112149.
- catalog contributor b7112150.
- catalog created "c1994.".
- catalog date "1994".
- catalog date "c1994.".
- catalog dateCopyrighted "c1994.".
- catalog description "1. Introduction -- 2. An Overview of TCP/IP -- 3. Firewall Gateways -- 4. How to Build an Application-Level Gateway -- 5. Authentication -- 6. Gateway Tools -- 7. Traps, Lures, and Honey Pots -- 8. The Hacker's Workbench -- 9. Classes of Attacks -- 10. An Evening with Berferd -- 11. Where the Wild Things Are: A Look at the Logs -- 12. Legal Considerations -- 13. Secure Communications over Insecure Networks -- 14. Where Do We Go from Here? -- A Useful Free Stuff -- B TCP and UDP Ports -- C Recommendations to Vendors.".
- catalog description "Includes bibliographical references (p. 257-276) and index.".
- catalog extent "xiv, 306 p. :".
- catalog hasFormat "Firewalls and Internet security.".
- catalog identifier "0201633574 (recycled paper)".
- catalog isFormatOf "Firewalls and Internet security.".
- catalog isPartOf "Addison-Wesley professional computing series".
- catalog issued "1994".
- catalog issued "c1994.".
- catalog language "eng".
- catalog publisher "Reading, Mass. : Addison-Wesley,".
- catalog relation "Firewalls and Internet security.".
- catalog subject "005.8 20".
- catalog subject "Computer networks Security measures.".
- catalog subject "Firewalls (Computer security)".
- catalog subject "Internet.".
- catalog subject "TK5105.875.I57 C44 1994".
- catalog tableOfContents "1. Introduction -- 2. An Overview of TCP/IP -- 3. Firewall Gateways -- 4. How to Build an Application-Level Gateway -- 5. Authentication -- 6. Gateway Tools -- 7. Traps, Lures, and Honey Pots -- 8. The Hacker's Workbench -- 9. Classes of Attacks -- 10. An Evening with Berferd -- 11. Where the Wild Things Are: A Look at the Logs -- 12. Legal Considerations -- 13. Secure Communications over Insecure Networks -- 14. Where Do We Go from Here? -- A Useful Free Stuff -- B TCP and UDP Ports -- C Recommendations to Vendors.".
- catalog title "Firewalls and Internet security : repelling the wily hacker / William R. Cheswick, Steven M. Bellovin.".
- catalog type "text".