- Building Internet Firewalls
By D. Brent Chapman & Elizabeth D. Zwicky
1st Edition September 1995
ISBN: 1-56592-124-0
- Everyone is jumping on the Internet bandwagon, despite the fact that the security risks associated with connecting
to the Net have never been greater. This book is a practical guide to building firewalls on the Internet. It describes
a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying
solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP,
Telnet) to work with a firewall, as well as a complete list of resources, including the location of many publicly
available firewall construction tools.
- Computer Crime: A Crimefighter's Handbook
By David Icove, Karl Seger & William VonStorch
1st Edition August 1995
ISBN: 1-56592-086-4
- This book is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how
to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well
as guidelines for investigators, law enforcement, and system administrators. Also includes computer-related
statutes and laws, a resource summary, detailed papers on computer crime, and a sample search warrant.
- Computer Security Basics
By Deborah Russell & G.T. Gangemi Sr.
1st Edition July 1991
ISBN: 0-937175-71-4
- Provides a broad introduction to the many areas of computer security and a detailed description of current security
standards. This handbook describes complicated concepts like trusted systems, encryption, and mandatory access
control in simple terms, and contains a thorough, readable introduction to the "Orange Book."
- Firewalls & Internet Security
By William R. Cheswick and Steven M. Bellovin
ISBN: 0-201-63357-4
- Written by the AT&T Bell Labs researchers who tracked the infamous "Berferd" hacker and also built the firewall
gateway at Bell Labs, Firewalls and Internet Security gives you invaluable advice and practical tools for protecting
your organization's computers from the very real threat of a hacker attack through the Internet. You will learn how
to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers - while
still allowing you easy access to Internet services.
- Practical UNIX & Internet Security, 2nd Edition
By Simson Garfinkel & Gene Spafford
2nd Edition April 1996
ISBN: 1-56592-148-8
- This second edition of the classic Practical UNIX Security is a complete rewrite of the original book. It's packed
with twice the pages and offers even more practical information for UNIX users and administrators. In it you'll find
coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital
UNIX, Linux, and others. Contents include UNIX and security basics, system administrator tasks, network
security, and appendices containing checklists and helpful summaries.
- UNIX Installation Security and Integrity
By David Ferbrache and Gavin Shearer
1st Edition January 1993
ISBN: 0-13-015389-3
- Here's a detailed technical overview of the security mechanisms used in commercial UNIX systems designed to
help readers ensure that their UNIX systems is correctly configured and operating in the most secure manner
possible. Coverage provides all the details for security related functions within common UNIX versions including
information on the configuration and operation of network security services; file system and process security;
monitoring security; security programming and standards; security mailing lists; and a wide range of system
specific security enhancements. System programmers as well as network and system administrators, and security
managers will find this an informative, practical reference.
- UNIX System Security
By David A. Curry
ISBN: 0-201-56327-4
- Issues discussed include account and password security, securing the file system, encryption and authentication
systems, TCP/IP network security, the Network Information Service (NIS), NFS, RFS, workstation security,
terminals and modems, and UUCP. Other chapters describe how to respond if your system is attacked and how to
develop a comprehensive security policy for your organization. The book also gives comprehensive lists of freely
available security software, and publications and mailing lists dealing with UNIX security.