🎉   Please check out our new website over at books-etc.com.

Seller
Your price
£29.50
Out of Stock

Building Linux and OpenBSD Firewalls

By (author) Wes Sonnenreich
Format: Mixed media product
Publisher: John Wiley and Sons Ltd, New York, United States
Imprint: John Wiley & Sons Inc
Published: 16th Feb 2000
Dimensions: w 188mm h 233mm d 20mm
Weight: 624g
ISBN-10: 0471353663
ISBN-13: 9780471353669
Barcode No: 9780471353669
Trade or Institutional customer? Contact us about large order quotes.
Synopsis
A step-by-step guide to bulding a commercial-grade firewall with open source software Building Linux and OpenBSD Firewalls Its now more important than ever before to protect your data and computers from people trying to hack into your network. Without the proper security, the wrong person can gain access to your system and read critical documents, change data, delete items, and much worse. With this book, you'll quickly learn how to protect your network from such attacks as you build a Linux or OpenBSD firewall. From determining how much security you'll need to configuring the firewall and monitoring your system, authors Tom Yates and Wes Sonnenreich clearly guide you through all the necessary steps to improve your security. They show you how to: Build Linux and OpenBSD firewalls that meet your security needs Choose the appropriate hardware for each operating system and put the machine together Configure a firewall that allows network services such as email, newsgroups, and Internet and intranet access Monitor and update your system to close any holes in security Detect intruders and restore your network security The companion Web site at www wiley.com/compbooks/sonnenreich features: Updates for the most recent releases of OpenBSD and Red Hat Useful scripts and tools Sample firewall configurations Additional online resources

New & Used

Seller Information Condition Price
-New
Out of Stock

What Reviewers Are Saying

Submit your review
Newspapers & Magazines
"This is an excellently written and organized examination of existing security perceptions and procedures."--System Administration magazine