9780596005696-0596005695-Linux iptables Pocket Reference

Linux iptables Pocket Reference

ISBN-13: 9780596005696
ISBN-10: 0596005695
Edition: First Edition
Author: Gregor N. Purdy
Publication date: 2004
Publisher: O'Reilly Media
Format: Paperback 96 pages
FREE US shipping on ALL non-marketplace orders
Marketplace
from $10.28 USD
Buy

From $4.71

Book details

ISBN-13: 9780596005696
ISBN-10: 0596005695
Edition: First Edition
Author: Gregor N. Purdy
Publication date: 2004
Publisher: O'Reilly Media
Format: Paperback 96 pages

Summary

Linux iptables Pocket Reference (ISBN-13: 9780596005696 and ISBN-10: 0596005695), written by authors Gregor N. Purdy, was published by O'Reilly Media in 2004. With an overall rating of 3.8 stars, it's a notable title among other Business Technology (Graphics & Design, Network Security, Security & Encryption, Unix, Operating Systems, Graphics & Multimedia, Programming, Utilities, Software, Web Design, Web Development & Design) books. You can easily purchase or rent Linux iptables Pocket Reference (Paperback, Used) from BooksRun, along with many other new and used Business Technology books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.19.

Description

Firewalls, Network Address Translation (Nat), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off. Do you watch for all types of Icmp traffic-some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of Tcp connections? Would you like to track how much traffic of various types you get? This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications, followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book