|
Newsletters
|
|
|
|
|
Wireless Developer Network Store in association with Amazon.com
Main > Enterprise_Development > Security
 Click here to buy! |
Firewalls and Internet Security: Repelling the Wily Hacker
Addison-Wesley Publishing Company
by William R. Cheswick, Steven M. Bellovin
These authors are both well-known senior researchers at ATT Bell Labs, and this book is based on their actual experiences maintaining, improving, and redesigning ATT's Internet gateway. They show why the most popular technologies for keeping intruders out are insufficient, while providing a step-by-step guide to their solution--building firewall gateways. |
 Click here to buy! |
Practical Unix and Internet Security
O'Reilly and Associates
by Simson Garfinkel, Gene Spafford
Practical Unix and Internet Security is on its second edition, and its maturity shows. To call this highly readable book comprehensive is an understatement. The breadth is vast, from fundamentals (definitions of computer security; the history of Unix) and commonsense but little-observed security basics (making backups; physical and personnel security; buggy software) to modern software (NFS, WWW, firewalls) and the handling of security incidents. The section on users and passwords alone is 21 pages long--and worth every page. Useful appendices include a Unix security checklist, a list of emergency response organizations, and many references to electronic and paper resources. |
 Click here to buy! |
Web Security and Commerce (Nutshell Handbook)
O'Reilly and Associates
by Simson Garfinkel, Gene Spafford
Garfinkel and Spafford, longtime Net veterans, overturn a lot of misconceptions about online security in a commonsense book that is easily accessible to even nontechnical readers. They make it clear that any commercial Web site requires careful attention to security-even if the site doesn't carry any sensitive information. Furthermore, the authors show that there's a lot more to security than merely encrypting transmissions. Their goal is to lay the foundation for securing the three parts of a system: the Web server and its data; the information that travels between server and user; and the user's own computer and the information stored there. |
|
|
|