Hot Best Seller

Linux Firewalls

Availability: Ready to download

An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls.


Compare

An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls.

36 review for Linux Firewalls

  1. 4 out of 5

    Kerszi

    Wszystko o iptables i nftables aż do bólu. Ale głównie o tym, chociaż jest też o zabezpieczeniach sieci.

  2. 4 out of 5

    Jascha

    Ever since the early 90s, when the Internet phenomenon exploded, security became an issue, since the number of exposed machines grown exponentially. This also led to an inevitable increase in the amount of books being written on the subject, thousands and thousands of pages targeting both simple end users, interested in protecting their home LAN, and network administrators, responsible to keep the gates of huge castles and companies well guarded against dragons and hackers. Among them, Linux Fir Ever since the early 90s, when the Internet phenomenon exploded, security became an issue, since the number of exposed machines grown exponentially. This also led to an inevitable increase in the amount of books being written on the subject, thousands and thousands of pages targeting both simple end users, interested in protecting their home LAN, and network administrators, responsible to keep the gates of huge castles and companies well guarded against dragons and hackers. Among them, Linux Firewalls definitely stands out, both for its quality and readability. Despite being 10 years old, it still represents a must have for any network and system administrator interested in learning how to defend the perimeter. Definitely targeting network professionals, on the contrary of many titles out there, Linux Firewalls tackles security from all sides. True, it is a text mainly focused on iptables, but it's not a reference, which is what the official man pages have been written for. The authors do instead cover security in a broad sense, from designing secure networks, depending on size and value of the services being protected, up to security incident response. Throughout the three parts of the book (which is actually made of four parts, considering the appendixes), we make the acquaintance of iptables through an example that, overall, is a good starting point for the reader to build upon its own firewall configuration. Each and every network protocol (ok, not every protocol...) is analyzed individually from the perspective of the gateway firewall. The authors share their expertise and show us the challenges we network administrators must face when that specific service is served either locally or remotely and how securely iptables can control it, if it can. Talking about shared expertise, I have particularly enjoyed the emphasis that the authors give not only to preventing malicious traffic from entering our network, but also to preventing it from leaving our gates, be it purposely generated or not. The chapters dedicated to investigating and reporting successful intrusions were ice on the cake. It's pretty hard to find something wrong with this title. If I must, well I think that more space should have been dedicated to both NAT and mangle tables. True, NAT has its own chapter dedicated but still, overall, they are really given a small share of the cake. A must have for any system/network administrator willing to understand how to secure his perimeter. This text is more than just firewalling; it's a concentrate of precious notes from a veteran to avoid newbies pitfalls. It definitely deserves an honored place in the bookshelf. As usual, you can find more reviews on my personal blog: http://books.lostinmalloc.com Feel free to pass by and share your thoughts!

  3. 4 out of 5

    Laurent

    Read the first and this edition. Great read.

  4. 4 out of 5

    Amarnath

  5. 5 out of 5

    John Faatuai

  6. 4 out of 5

    Andrew Douma

  7. 4 out of 5

    Mohammad Islam

  8. 5 out of 5

    Jonathan S Harrison

  9. 4 out of 5

    Martin

  10. 5 out of 5

    Tom

  11. 5 out of 5

    Subhajit Das

  12. 5 out of 5

    John Farthing

  13. 4 out of 5

    Ray Savarda

  14. 5 out of 5

    michael

  15. 5 out of 5

    Michele Angiolillo

  16. 5 out of 5

    Joshua

  17. 4 out of 5

    Marco1_79

  18. 4 out of 5

    drac

  19. 5 out of 5

    J

  20. 5 out of 5

    Greg

  21. 5 out of 5

    Ben

  22. 5 out of 5

    Robert Postill

  23. 5 out of 5

    Kimmo

  24. 4 out of 5

    Allain Lalonde

  25. 4 out of 5

    Abdul Zainal

  26. 4 out of 5

    Shyno

  27. 5 out of 5

    Hnv Dutt

  28. 4 out of 5

    Computeristgeek

  29. 4 out of 5

    Jerome Gomez

  30. 5 out of 5

    Subhranil Dey

  31. 4 out of 5

    Esteban Jorge

  32. 5 out of 5

    Satyanarayana Mantri

  33. 4 out of 5

    Amanda Donnelly

  34. 4 out of 5

    PHAN XUÂN ĐỨC

  35. 4 out of 5

    Azzaz

  36. 4 out of 5

    Manuel A.

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.