Protecting Your Web Site with Firewalls
Author: Marcus Goncalves
Publisher: Prentice Hall PTR
Price: $49 US
Reviewer: Leam Hall
If you can configure a DNS nameserver on your coffee break, this book is not for you. However, if you need a platform-independent general overview of Internet/Intranet security issues, Mr. Goncalves uses a conversational tone and an abundance of resources to help you get a firm grasp of the basics.
There are many web sites that are unprotected and unsecured. This may be due to a system administrator who is over tasked and does not have enough research time, who is new to a particular operating system or who just does not know how important security is. The author provides good, basic information on what the security needs may be and how to balance cost of security against availability of services. Individual chapters give introductions to financial issues, strategies for different web site platforms and implementing services like conferencing, e-mail, FTP, NNTP and HTTP.
There is also plenty of material written in non-technical language. This can be very useful when trying to educate upper management on basic security issues and why they need to be funded. The whole book provides many information sites, including 77 pages of appendices giving resources for firewall products, web server products, authentication, password and other administrative tools. This may be the best part of the book, to help you quickly see what sort of material is available for your operating system.
There are a few things I did not like about the book. The editing and proofreading could have been better. I generally read too quickly to find spelling or grammatical errors, but I found some here. Also, several sections left me wondering what I was supposed to have learned. My most abundant gripe is the nondifferentiation between “hackers” and “crackers”. I consider myself a junior hacker, yet one of the most law abiding people I know. Hackers play with code and try to create; crackers intrude—hopefully the media will soon understand the difference. There is also the ubiquitous CD-ROM; this one contains an evaluation copy of an NT-based logging and reporting system. Nothing for the Unix/Linux crowd.
The book's target audience is those who need a very basic introduction with a lot of resources. It meets that market well, but most Linux Journal readers will be somewhat more advanced. For $49 US, get this book only if you are certain it meets your particular needs. Otherwise, do a lot of web surfing and find a book tailored to your specific operating system and level of expertise.
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
|Concerning Containers' Connections: on Docker Networking||Aug 26, 2015|
|My Network Go-Bag||Aug 24, 2015|
|Doing Astronomy with Python||Aug 19, 2015|
|Build a “Virtual SuperComputer” with Process Virtualization||Aug 18, 2015|
- Concerning Containers' Connections: on Docker Networking
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- Firefox Security Exploit Targets Linux Users and Web Developers
- My Network Go-Bag
- Doing Astronomy with Python
- Build a “Virtual SuperComputer” with Process Virtualization
- Three More Lessons
- diff -u: What's New in Kernel Development