Browse Results What Format Should I Choose?

Showing 1 through 8 of 8 results

Building Internet Firewalls

by D. Brent Chapman Simon Cooper Elizabeth D. Zwicky

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.

Building Internet Firewalls, 2nd Edition

by D. Brent Chapman Simon Cooper Elizabeth D. Zwicky

Completely revised and much expanded, the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix, Linux, and Windows NT. This practical and detailed guide explains in step-by-step fashion how to design and install firewalls and configure Internet services to work with a firewall. It covers a wide range of services and protocols and offers a complete list of resources, including the location of many publicly available firewalls construction tools.

Building Internet Firewalls, 2nd Edition

by D. Brent Chapman Simon Cooper Elizabeth D. Zwicky

Completely revised and much expanded, the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix, Linux, and Windows NT. This practical and detailed guide explains in step-by-step fashion how to design and install firewalls and configure Internet services to work with a firewall. It covers a wide range of services and protocols and offers a complete list of resources, including the location of many publicly available firewalls construction tools.

Goldfish from Beyond the Grave #4

by Simon Cooper Sam Hay

What happens when a beloved pet refuses to go through to the other side? The protector of undead pets may be a fish out of water this time.Just when Joe thought things couldn't get any stranger, he is visited by Fizz, a zombie goldfish. Fizz was flushed down the toilet by his owner Danny's little sister, who doesn't realize that she's sent the fish to a watery grave. Fizz needs to ensure the truth is revealed before his fellow fish meet a similar fate. But how do you get a goldfish to rest in peace?

Night of the Howling Hound #3

by Simon Cooper Sam Hay

Joe is off on a school trip to an adventure park, and he can't wait to put Uncle Charlie's survival tips into practice! But it's not long before he's visited by Dexter, a scruffy-looking dog, with a howling tale of woe. Dexter doesn't want his owner feeling guilty for his death, but it'll be hard for Joe to help this time - it turns out that the owner is Joe's headmaster, the dreaded Mr. Hill!

Return of the Hungry Hamster #1

by Simon Cooper Sam Hay

Dumpling the hamster came to a dusty end inside a vacuum cleaner. He suspects that his owner Oliver's parents never admitted to their son that they were to blame for Dumpling's demise. Now the hamster needs Joe's help to reveal the truth - but there's a furry surprise awaiting them at Oliver's house...

Revenge of the Phantom Furball #2

by Simon Cooper Sam Hay

Disaster strikes when Bonsai the pug chases Pickle the cat into the street, where she is flattened by a car. But the fact that Pickle has (almost) shuffled off her mortal coil isn't her biggest concern; she is worried that Bonsai will pursue her sister Pebble into an early grave too, unless she and Joe teach the dog a lesson...

Rise of the Zombie Rabbit #5

by Simon Cooper Sam Hay

Joe is just starting to hope that he is free of undead pets when he is visited by Fluffy, a pet rabbit who was snapped up by a hungry fox. Fluffy's owner lost a necklace in her back yard, and she's going to be in big trouble if it isn't found. Fluffy can't bear to see her owner in distress and she demands that Joe finds the necklace--now! Can Joe do what Fluffy wants, or will the undead pet be hopping around forever?

Showing 1 through 8 of 8 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.