Books & Videos

Table of Contents

  1. Network Security

    1. Chapter 1 Why Internet Firewalls?

      1. What Are You Trying to Protect?
      2. What Are You Trying to Protect Against?
      3. Who Do You Trust?
      4. How Can You Protect Your Site?
      5. What Is an Internet Firewall?
      6. Religious Arguments
    2. Chapter 2 Internet Services

      1. Secure Services and Safe Services
      2. The World Wide Web
      3. Electronic Mail and News
      4. File Transfer, File Sharing, and Printing
      5. Remote Access
      6. Real-Time Conferencing Services
      7. Naming and Directory Services
      8. Authentication and Auditing Services
      9. Administrative Services
      10. Databases
      11. Games
    3. Chapter 3 Security Strategies

      1. Least Privilege
      2. Defense in Depth
      3. Choke Point
      4. Weakest Link
      5. Fail-Safe Stance
      6. Universal Participation
      7. Diversity of Defense
      8. Simplicity
      9. Security Through Obscurity
  2. Building Firewalls

    1. Chapter 4 Packets and Protocols

      1. What Does a Packet Look Like?
      2. IP
      3. Protocols Above IP
      4. Protocols Below IP
      5. Application Layer Protocols
      6. IP Version 6
      7. Non-IP Protocols
      8. Attacks Based on Low-Level Protocol Details
    2. Chapter 5 Firewall Technologies

      1. Some Firewall Definitions
      2. Packet Filtering
      3. Proxy Services
      4. Network Address Translation
      5. Virtual Private Networks
    3. Chapter 6 Firewall Architectures

      1. Single-Box Architectures
      2. Screened Host Architectures
      3. Screened Subnet Architectures
      4. Architectures with Multiple Screened Subnets
      5. Variations on Firewall Architectures
      6. Terminal Servers and Modem Pools
      7. Internal Firewalls
    4. Chapter 7 Firewall Design

      1. Define Your Needs
      2. Evaluate the Available Products
      3. Put Everything Together
    5. Chapter 8 Packet Filtering

      1. What Can You Do with Packet Filtering?
      2. Configuring a Packet Filtering Router
      3. What Does the Router Do with Packets?
      4. Packet Filtering Tips and Tricks
      5. Conventions for Packet Filtering Rules
      6. Filtering by Address
      7. Filtering by Service
      8. Choosing a Packet Filtering Router
      9. Packet Filtering Implementations for General-Purpose Computers
      10. Where to Do Packet Filtering
      11. What Rules Should You Use?
      12. Putting It All Together
    6. Chapter 9 Proxy Systems

      1. Why Proxying?
      2. How Proxying Works
      3. Proxy Server Terminology
      4. Proxying Without a Proxy Server
      5. Using SOCKS for Proxying
      6. Using the TIS Internet Firewall Toolkit for Proxying
      7. Using Microsoft Proxy Server
      8. What If You Can't Proxy?
    7. Chapter 10 Bastion Hosts

      1. General Principles
      2. Special Kinds of Bastion Hosts
      3. Choosing a Machine
      4. Choosing a Physical Location
      5. Locating Bastion Hosts on the Network
      6. Selecting Services Provided by a Bastion Host
      7. Disabling User Accounts on Bastion Hosts
      8. Building a Bastion Host
      9. Securing the Machine
      10. Disabling Nonrequired Services
      11. Operating the Bastion Host
      12. Protecting the Machine and Backups
    8. Chapter 11 Unix and Linux Bastion Hosts

      1. Which Version of Unix?
      2. Securing Unix
      3. Disabling Nonrequired Services
      4. Installing and Modifying Services
      5. Reconfiguring for Production
      6. Running a Security Audit
    9. Chapter 12 Windows NT and Windows 2000 Bastion Hosts

      1. Approaches to Building Windows NT Bastion Hosts
      2. Which Version of Windows NT?
      3. Securing Windows NT
      4. Disabling Nonrequired Services
      5. Installing and Modifying Services
  3. Internet Services

    1. Chapter 13 Internet Services and Firewalls

      1. Attacks Against Internet Services
      2. Evaluating the Risks of a Service
      3. Analyzing Other Protocols
      4. What Makes a Good Firewalled Service?
      5. Choosing Security-Critical Programs
      6. Controlling Unsafe Configurations
    2. Chapter 14 Intermediary Protocols

      1. Remote Procedure Call (RPC)
      2. Distributed Component Object Model (DCOM)
      3. NetBIOS over TCP/IP (NetBT)
      4. Common Internet File System (CIFS) and Server Message Block (SMB)
      5. Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP)
      6. ToolTalk
      7. Transport Layer Security (TLS) and Secure Socket Layer (SSL)
      8. The Generic Security Services API (GSSAPI)
      9. IPsec
      10. Remote Access Service (RAS)
      11. Point-to-Point Tunneling Protocol (PPTP)
      12. Layer 2 Transport Protocol (L2TP)
    3. Chapter 15 The World Wide Web

      1. HTTP Server Security
      2. HTTP Client Security
      3. HTTP
      4. Mobile Code and Web-Related Languages
      5. Cache Communication Protocols
      6. Push Technologies
      7. RealAudio and RealVideo
      8. Gopher and WAIS
    4. Chapter 16 Electronic Mail and News

      1. Electronic Mail
      2. Simple Mail Transfer Protocol (SMTP)
      3. Other Mail Transfer Protocols
      4. Microsoft Exchange
      5. Lotus Notes and Domino
      6. Post Office Protocol (POP)
      7. Internet Message Access Protocol (IMAP)
      8. Microsoft Messaging API (MAPI)
      9. Network News Transfer Protocol (NNTP)
    5. Chapter 17 File Transfer, File Sharing, and Printing

      1. File Transfer Protocol (FTP)
      2. Trivial File Transfer Protocol (TFTP)
      3. Network File System (NFS)
      4. File Sharing for Microsoft Networks
      5. Summary of Recommendations for File Sharing
      6. Printing Protocols
      7. Related Protocols
    6. Chapter 18 Remote Access to Hosts

      1. Terminal Access (Telnet)
      2. Remote Command Execution
      3. Remote Graphical Interfaces
    7. Chapter 19 Real-Time Conferencing Services

      1. Internet Relay Chat (IRC)
      2. ICQ
      3. talk
      4. Multimedia Protocols
      5. NetMeeting
      6. Multicast and the Multicast Backbone (MBONE)
    8. Chapter 20 Naming and Directory Services

      1. Domain Name System (DNS)
      2. Network Information Service (NIS)
      3. NetBIOS for TCP/IP Name Service and Windows Internet Name Service
      4. The Windows Browser
      5. Lightweight Directory Access Protocol (LDAP)
      6. Active Directory
      7. Information Lookup Services
    9. Chapter 21 Authentication and Auditing Services

      1. What Is Authentication?
      2. Passwords
      3. Authentication Mechanisms
      4. Modular Authentication for Unix
      5. Kerberos
      6. NTLM Domains
      7. Remote Authentication Dial-in User Service (RADIUS)
      8. TACACS and Friends
      9. Auth and identd
    10. Chapter 22 Administrative Services

      1. System Management Protocols
      2. Routing Protocols
      3. Protocols for Booting and Boot-Time Configuration
      4. ICMP and Network Diagnostics
      5. Network Time Protocol (NTP)
      6. File Synchronization
      7. Mostly Harmless Protocols
    11. Chapter 23 Databases and Games

      1. Databases
      2. Games
    12. Chapter 24 Two Sample Firewalls

      1. Screened Subnet Architecture
      2. Merged Routers and Bastion Host Using General-Purpose Hardware
  4. Keeping Your Site Secure

    1. Chapter 25 Security Policies

      1. Your Security Policy
      2. Putting Together a Security Policy
      3. Getting Strategic and Policy Decisions Made
      4. What If You Can't Get a Security Policy?
    2. Chapter 26 Maintaining Firewalls

      1. Housekeeping
      2. Monitoring Your System
      3. Keeping up to Date
      4. How Long Does It Take?
      5. When Should You Start Over?
    3. Chapter 27 Responding to Security Incidents

      1. Responding to an Incident
      2. What to Do After an Incident
      3. Pursuing and Capturing the Intruder
      4. Planning Your Response
      5. Being Prepared
  5. Appendixes

    1. Appendix A Resources

      1. Web Pages
      2. FTP Sites
      3. Mailing Lists
      4. Newsgroups
      5. Response Teams
      6. Other Organizations
      7. Conferences
      8. Papers
      9. Books
    2. Appendix B Tools

      1. Authentication Tools
      2. Analysis Tools
      3. Packet Filtering Tools
      4. Proxy Systems Tools
      5. Daemons
      6. Utilities
    3. Appendix C Cryptography

      1. What Are You Protecting and Why?
      2. Key Components of Cryptographic Systems
      3. Combined Cryptography
      4. What Makes a Protocol Secure?
      5. Information About Algorithms
  1. Colophon