Network Security_ A Beginner's Guide - Maiwald_ Eric.pdf

(7112 KB) Pobierz
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
878910736.023.png
Network Security
A Beginner’s Guide
Second Edition
Eric Maiwald
McGraw-Hill/Osborne
New York
Chicago
San Francisco
Lisbon
London
Madrid
Mexico City
Milan
New Delhi
San Juan
Seoul
Singapore
Sydney
Toronto
878910736.024.png 878910736.025.png 878910736.026.png 878910736.001.png 878910736.002.png
McGraw-Hill/Osborne
2100 Powell Street, 10 th Floor
Emeryville, California 94608
U.S.A.
To arrange bulk purchase discounts for sales promotions, premiums, or fund-raisers, please
contact McGraw-Hill/Osborne at the above address. For information on translations or
book distributors outside the U.S.A., please see the International Contact Information page
immediately following the index of this book.
Network Security: A Beginner’s Guide, Second Edition
Copyright © 2003 by The McGraw-Hill Companies. All rights reserved. Printed in the
United States of America. Except as permitted under the Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any form or by any means, or stored in
a database or retrieval system, without the prior written permission of publisher, with the
exception that the program listings may be entered, stored, and executed in a computer
system, but they may not be reproduced for publication.
1234567890 FGR FGR 019876543
ISBN 0-07-222957-8
Publisher Brandon A. Nordin
Vice President & Associate Publisher
Scott Rogers
Editorial Director Tracy Dunkelberger
Executive Editor Jane Brownlow
Project Editor Jody McKenzie
Acquisitions Coordinator Athena Honore
Contributing Author Philip Cox
Technical Editors John Bock, Mariana Hentea
Copy Editor Lunaea Weatherstone
Proofreader Claire Splan
Indexer Irv Hershman
Computer Designers Carie Abrew, Tara A. Davis
Illustrators Melinda Moore Lytle, Jackie Sieben, Lyssa Wald
Series Design Jean Butterfield
Cover Series Design
Sarah F. Hinks
This book was composed with Corel VENTURA™ Publisher.
Information has been obtained by McGraw-Hill/Osborne from sources believed to be reliable. However, because of the possibility
of human or mechanical error by our sources, McGraw-Hill/Osborne, or others, McGraw-Hill/Osborne does not guarantee the
accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained
from the use of such information.
878910736.003.png
 
 
878910736.004.png 878910736.005.png 878910736.006.png 878910736.007.png 878910736.008.png 878910736.009.png 878910736.010.png 878910736.011.png 878910736.012.png
This book is dedicated to my wife, Kay, and my two sons,
Steffan and Joel. The three of them support me during my work
and have put up with the long hours I spent working on this book.
878910736.013.png 878910736.014.png 878910736.015.png 878910736.016.png 878910736.017.png
About the Author
Eric Maiwald, CISSP, is the Director of Product Management and Support for Bluefire Security
Technologies. Eric has more than 15 years of experience in information security that includes
work in both the government and commercial sectors. He has performed assessments, developed
policies, and implemented security solutions for large financial institutions, healthcare firms, and
manufacturers. Eric holds a Bachelor of Science degree in electrical engineering from Rensselaer
Polytechnic Institute and a Master of Engineering degree in electrical engineering from Stevens
Institute of Technology, and he is a Certified Information Systems Security Professional. Eric is
a regular presenter at a number of well-known security conferences. He has also written Security
Planning and Disaster Recovery (with William Sieglein), published by McGraw-Hill/Osborne,
and is a contributing author for Hacking Linux Exposed and Hacker’s Challenge
(McGraw-Hill/Osborne). He can be reached at emaiwald@fred.net.
About the Contributing Author
Philip Cox is a consultant with SystemExperts Corporation. He is an industry-recognized
consultant, author, and lecturer, with an extensive track record of hands-on accomplishment.
Phil is the primary author of the authoritative Windows 2000 Security Handbook (McGraw-Hill/
Osborne). Phil holds a Bachelor of Science degree in Computer Science from the College of
Charleston and is a Microsoft Certified Systems Engineer.
About the Technical Editors
John Bock, CISSP, is a R&D engineer at Foundstone, where he specializes in network assessment
technologies and wireless security. He is responsible for designing new assessment features
in the Foundstone Enterprise Risk Solutions product line. John has a strong background in
network security both as a consultant and lead for an enterprise security team. Before joining
Foundstone he performed penetration testing and security assessments, and spoke about wireless
security as a consultant for Internet Security Systems (ISS).
Mariana Hentea is Assistant Professor at Purdue University at Calumet, Indiana. She is a
member of IEEE and SWE. She has an M.S. and Ph.D. in Computer Science from the Illinois
Institute of Technology at Chicago, and a B.S. in Electrical Engineering and M.S. in Computer
Engineering from Polytechnic Institute of Timisoara, Romania. She has published papers in a
broad spectrum of computer software and engineering applications for telecommunications,
steel, and chemical industries. In 1995, Mariana supported the design and implementation of
the computer and network security for the Department of Defense (DoD).
878910736.018.png 878910736.019.png 878910736.020.png 878910736.021.png 878910736.022.png
Zgłoś jeśli naruszono regulamin