版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.csdn.net/topmvp - topmvp
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup the script, and verify our installation. These comprehensive set of set up scripts and set up guidelines to create firewall protection for various specific usage scenarios are unique and set this book apart.
http://rapidshare.com/files/54458533/1904811655.zip
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup the script, and verify our installation. These comprehensive set of set up scripts and set up guidelines to create firewall protection for various specific usage scenarios are unique and set this book apart.
http://rapidshare.com/files/54458533/1904811655.zip