---
product_id: 4416591
title: "Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional Computing Series)"
price: "R155"
currency: ZAR
in_stock: false
reviews_count: 9
url: https://www.desertcart.co.za/products/4416591-firewalls-and-internet-security-repelling-the-wily-hacker-addison-wesley
store_origin: ZA
region: South Africa
---

# Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional Computing Series)

**Price:** R155
**Availability:** ❌ Out of Stock

## Quick Answers

- **What is this?** Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional Computing Series)
- **How much does it cost?** R155 with free shipping
- **Is it available?** Currently out of stock
- **Where can I buy it?** [www.desertcart.co.za](https://www.desertcart.co.za/products/4416591-firewalls-and-internet-security-repelling-the-wily-hacker-addison-wesley)

## Best For

- Customers looking for quality international products

## Why This Product

- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing readers how to think about threats and solutions. The completely updated and expanded second edition defines the security problems students face in today's Internet, identifies the weaknesses of the most popular security technologies, and illustrates the ins and outs of deploying an effective firewall. Students learn how to plan and execute a security strategy that allows easy access to Internet services while defeating even the wiliest of hackers. Written by well-known senior researchers at AT&T Bell Labs, Lumeta, and Johns Hopkins University the students will benefit from the actual, real-world experiences of the authors maintaining, improving, and redesigning AT&T's Internet gateway.

Review: Five Stars - Great book. Helped me a lot through my research paper.
Review: Enjoyable and useful - This is an introductory text, that is entertainly written. I originally read the first edition of this book. While preparing a recent seminar I found that I wanted to reference it, but then realized that the material was somewhat dated. The second edition is from 2003, which is still 7 years old, but I find that the information is still very useful, the definition of a classic. More than a mere book on firewalls, this is a primer for the entire workings of the Internet Protocols. It has clear explanations of DNS, DHCP, TCP, UDP, ICMP, SSL, FTP and many other protocols without all the nitty gritty details that you'll find in a book like "TCP/IP Illustrated." , which I recommend if you need more technical detail. The authors describe the risks associated with the protocols and strategies for protecting your systems. But, they go further, and explain other attacks and how they might circumvent the barriers that a sysadmin might erect. The exposition on Firewalls and VPNs (Virtual Private Networks) begins in Part IV. There are specific strategies given for protecting several protocols. No specifics on CISCO PIX, sorry guys, the examples use software generally available on Unix (FreeBSD). But, that's mainly a syntax issue, the principles are the same for the large comercial firewall systems. But, once again, if you need specifics, you'll need to read the manuals. This book will give you the foundation to understand what you read in the manuals. Firewall manuals are dry in comparison and generally lack strategic recommendations. The first appendix does a decent job of explaining public key cryptography. The second appendix is "dated" though in that it attempts to give "links" to other resources. After 7+ years, you can imagine the problems with that. Likewise the bibliography mainly cites texts from the 1990's; although there is one reference from 1872: "Through the Looking Glass", Lewis Carroll. Typical of the entertaining quotes throughout the book, "When I use a word. . .it means just what I choose it to mean, neither more nor less." And perhaps that's a fitting summary of this book's purpose, to familiarize you with the meanings of the "Carrollesque" words associated with Internet Security.

## Features

- Used Book in Good Condition

## Technical Specifications

| Specification | Value |
|---------------|-------|
| Best Sellers Rank | #2,098,076 in Books ( See Top 100 in Books ) #841 in Computer Hacking #1,126 in Privacy & Online Safety #3,298 in Internet & Telecommunications |
| Customer Reviews | 4.4 out of 5 stars 35 Reviews |

## Images

![Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional Computing Series) - Image 1](https://m.media-amazon.com/images/I/819FJbtzxeL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ Five Stars
*by L***U on April 2, 2015*

Great book. Helped me a lot through my research paper.

### ⭐⭐⭐⭐ Enjoyable and useful
*by D***R on October 4, 2010*

This is an introductory text, that is entertainly written. I originally read the first edition of this book. While preparing a recent seminar I found that I wanted to reference it, but then realized that the material was somewhat dated. The second edition is from 2003, which is still 7 years old, but I find that the information is still very useful, the definition of a classic. More than a mere book on firewalls, this is a primer for the entire workings of the Internet Protocols. It has clear explanations of DNS, DHCP, TCP, UDP, ICMP, SSL, FTP and many other protocols without all the nitty gritty details that you'll find in a book like "TCP/IP Illustrated." <http://www.amazon.com/TCP-IP-Illustrated-Vol-Protocols/dp/0201633469>, which I recommend if you need more technical detail. The authors describe the risks associated with the protocols and strategies for protecting your systems. But, they go further, and explain other attacks and how they might circumvent the barriers that a sysadmin might erect. The exposition on Firewalls and VPNs (Virtual Private Networks) begins in Part IV. There are specific strategies given for protecting several protocols. No specifics on CISCO PIX, sorry guys, the examples use software generally available on Unix (FreeBSD). But, that's mainly a syntax issue, the principles are the same for the large comercial firewall systems. But, once again, if you need specifics, you'll need to read the manuals. This book will give you the foundation to understand what you read in the manuals. Firewall manuals are dry in comparison and generally lack strategic recommendations. The first appendix does a decent job of explaining public key cryptography. The second appendix is "dated" though in that it attempts to give "links" to other resources. After 7+ years, you can imagine the problems with that. Likewise the bibliography mainly cites texts from the 1990's; although there is one reference from 1872: "Through the Looking Glass", Lewis Carroll. Typical of the entertaining quotes throughout the book, "When I use a word. . .it means just what I choose it to mean, neither more nor less." And perhaps that's a fitting summary of this book's purpose, to familiarize you with the meanings of the "Carrollesque" words associated with Internet Security.

### ⭐⭐⭐⭐⭐ A Holistic Approach to Internet Security�..
*by D***S on July 4, 2003*

A timely and much needed update to the first edition, Fwais 2.0 is an excellent overview of the current landscape and psychology involving intranet, VPN and Internet host security while correctly addressing the positives and negatives of firewall / internet security and the techniques used by hackers. The authors start with hacking and security needs analysis, progress thru strategies and techniques, and end with useful security formulas, hypotheses and real life examples. They draw upon their own experiences and observations about network security and host protection to give the reader a well-rounded view of the concepts of security as they apply today. The book is well written with simple examples and antecedents. They have taken great care to explain how hackers work and their methodology. The best thing about the book is that it does not go into great detail about unnecessary finite security specifics and shows what works best while adding value by allowing the reader the opportunity to think for themselves and address their own needs. They maintain the premise that: " Simple security is better than complex security: it is easier to understand, verify, and maintain."(Page 81) while covering the types of attacks not only by method, but also by class, ranging from the kiddie script up to the sophisticated tunneling and VPN methods. FWAIS 2.0 is a comprehensive guide to the most common security problems while not wasting time on the insignificant. It includes a good set of general rules and the tool sets necessary to secure a network at any level. FAWAIS 2.0 covers current protocols and allows simple guidelines for flexibility in determining your own network needs. It describes the weaknesses in both hardware and software while addressing their relational aspects in easy to understand terms. Written with Freebsd in mind many of the techniques in this edition adapt well to other sources such as Linux, Os/X, Unix, NetBsd, and Solaris. The entire premise of the book revolves around the concept that old style layered security is not as good as it may appear. And that internet security and firewalls are a holistic endeavor of system integration and design. The authors have taken care to show just how difficult it can be to keep up with large network topology and lend truth to the fact that; "There is no such thing as absolute security." (Page 3) The concepts found in this book cover subjects such as : What firewalls can and cannot do, capabilities and weaknesses. What filtering services work best. What services and practices are overkill. Why firewalls are necessary, the risks to servers and the servers relationship to proper firewall installation. What the steps to hacking are and the methodology used to break into a host. The why, what and where of limiting services and the tools to secure the appropriate functions. Types of firewalls and best practices for implementing security while building and designing firewalls. Why building your own firewalls may be your best solution. Applying past experiences to your firewall design. Intrusion detection systems and their role as a network tool in firewall construction. Honey pot examples showing how the techniques have been used to thwart and frustrate potential adversaries. This is not a how to book written with step-by-step specific fill in the blanks, connect the dots, detailed mechanical guidelines, it addresses the real needs of the administrator in relation to actual daily situations. As they state on page 213 "-we don't think the hard part of firewall administration is data entry, it is knowing what the appropriate policies are." The second edition is well documented and includes plenty of good link references, appendices and bibliography resources to help any professional keep current with the ever-changing environment of network defense. Any organization evaluating current security needs should find the second edition helpful for determining their security goals and a comprehensive guide to help design, implement and deploy firewalls. The second edition is a definite must for any security library, certification-training program or public/private classroom situation. I recommend Firewalls and Internet Security as the best starting point for anyone who might be considering any changes in company security structure or earning their security certifications.

---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.co.za/products/4416591-firewalls-and-internet-security-repelling-the-wily-hacker-addison-wesley](https://www.desertcart.co.za/products/4416591-firewalls-and-internet-security-repelling-the-wily-hacker-addison-wesley)

---

*Product available on Desertcart South Africa*
*Store origin: ZA*
*Last updated: 2026-05-11*