[LWN Logo]
[Timeline]
Date: Fri, 7 Jul 2000 13:42:50 -0700 (PDT)
From: Lisa Mann <lisam@oreilly.com>
To: lwn@lwn.net
Subject: Internet attacks more serious says author

For more information, a review copy, cover image, or interview
with the authors, contact:
Lisa Mann (707)829-0515 ext 230 or lisam@oreilly.com


INTERNET ATTACKS MORE SERIOUS AND TECHNICALLY COMPLEX, 
SAYS AUTHOR OF "BUILDING INTERNET FIREWALLS"

Sebastopol, CA--Internet security threats include password attacks and
the exploiting of known security holes, which have been around since
the early days of networking. Other threats, like password sniffers, IP
forgery, and various types of hijacking and replay attacks, are newer.
And still others, like the distributed denial of service attacks that
crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000,
come from today's headlines.  "The attacks on Internet-connected
systems we are seeing today are more serious and more technically
complex than those in the past," says Elizabeth D. Zwicky, co-author of
"Building Internet Firewalls". "To keep those attacks from compromising
our systems, we all need all the help we can get."

Firewalls are a very effective way to protect your system from most
Internet security threats and are a critical component of today's
computer networks. Firewalls in networks keep damage on one part of the
network (e.g., eavesdropping, a worm program, file damage) from
saspreading to the rest of the network. Without firewalls, network
security problems can rage out of control, dragging more and more
systems down.

Like the first edition of the highly respected and best-selling
"Building Internet Firewalls", the second edition is a practical and
detailed guide to building firewalls on the Internet. It provides
step-by-step explanations of how to design and install firewalls, and
how to configure Internet services to work with a firewall. The second
edition is much expanded. It covers Linux and Windows NT, as well as
Unix platforms. It describes a variety of firewall technologies (packet
filtering, proxying, network address translation, virtual private
networks) as well as architectures (e.g., screening routers, dual-homed
hosts, screened hosts, screened subnets, perimeter networks, internal
firewalls).

The book also contains a new set of chapters describing the issues
involved in a variety of new Internet services and protocols through a
firewall. It covers email and news; Web services and scripting
languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio,
RealVideo); file transfer and sharing services (e.g., NFS, Samba);
remote access services (e.g., Telnet, the BSD "r" commands, SSH,
BackOffice 2000); real-time conferencing services (e.g., ICQ, talk);
naming and directory services (e.g.,DNS, NetBT, the Windows Browser);
authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
administrative services (e.g., syslog, SNMP, SMS, RIP and other routing
protocols, and ping and other network diagnostics); intermediary
protocols (e.g., RPC, SMB, CORBA, IIOP); and database protocols (e.g.,
ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL
Server).

In addition, "Building Internet Firewalls, Second Edition" features a
complete list of resources, including the location of many publicly
available firewall construction tools.

Chapter 13, Internet Services and Firewalls, is available free online
at:  http://www.oreilly.com/catalog/fire2/chapter/ch13.html

For more information about the book, including Table of Contents,
index, author bio, and samples, see:
http://www.oreilly.com/catalog/fire2/

For a cover graphic in jpeg format, go to:
ftp://ftp.ora.com/pub/graphics/book_covers/hi-res/1565928717.jpg


# # # 


Building Internet Firewalls
By Elizabeth D. Zwicky, Simon Cooper, & D. Brent Chapman
2nd Edition, July 2000 
1-56592-871-7, 894 pages, $44.95 (US$)
order@oreilly.com
1-800-998-9938
http://www.oreilly.com