| 000 | 01942cam a2200421 i 4500 | ||
|---|---|---|---|
| 999 |
_c200436373 _d54585 |
||
| 001 | 200436373 | ||
| 003 | TR-AnTOB | ||
| 005 | 20200108153056.0 | ||
| 007 | ta | ||
| 008 | 030113t20032003maua b 001 0 eng | ||
| 010 | _a2003000644 | ||
| 020 |
_a020163466X _q(paperback) |
||
| 020 |
_a9780201634662 _q(paperback) |
||
| 035 | _a(TR-AnTOB)200436373 | ||
| 040 |
_aDLC _beng _erda _cDLC _dC#P _dTR-AnTOB |
||
| 041 | 0 | _aeng | |
| 050 | 0 | 0 |
_aTK5105.875.I57 _bC44 2003 |
| 090 |
_aTK5105.875.I57 _bC44 2003 |
||
| 100 | 1 |
_aCheswick, William R. _eauthor _9125711 |
|
| 245 | 1 | 0 |
_aFirewalls and Internet security : _brepelling the wily hacker / _cWilliam R. Cheswick, Steven M. Bellovin, Aviel D. Rubin. |
| 250 | _aSecond edition. | ||
| 264 | 1 |
_aBoston : _bAddison-Wesley, _c[2003] |
|
| 264 | 4 | _c©2003 | |
| 300 |
_axx, 433 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | 0 | _aAddison-Wesley professional computing series. | |
| 504 | _aIncludes bibliographical references (pages 350-388) and index | ||
| 505 | 0 | _aIntroduction -- A Security Review of Protocols: Lower Layers -- Securtiy Review: The Upper Layers -- The Web: Threat or Menace? --Classes of Attacks -- The Hacker's Workbench, and Other Munitions --Authentication -- Using Some Tools and Services -- Kinds of Firewalls -- Filtering Services -- Firewall Engineering -- Tunneling and VPNs -- Network Layout -- Safe Hosts in a Hostile Environment -- Intrusion Detection -- An Evening with Berferd -- The Taking of Clark -- Secure Communications over Insecure Networks -- Where Do We Go from Here?. | |
| 590 | _aDonated by Kemal Bıçakcı | ||
| 650 | 0 |
_aFirewalls (Computer security) _92655 |
|
| 700 | 1 |
_aBellovin, Steven M. _eauthor _9125712 |
|
| 700 | 1 |
_aRubin, Aviel D. _eauthor _9125713 |
|
| 942 |
_2lcc _cBK |
||