Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 57.
... Bastille Bastille Functions Bastille Versions Implementing Bastille Undoing Bastille Changes Controlling and Auditing Root Access with Sudo 77 System Requirements The Sudo Command Downloading Sudo Installing Sudo Configuring Sudo ...
... Bastille Log Appendix B Hack Proofing Linux Fast Track Index 568 569 570 572 575 575 576 579 581 583 584 586 587 588 590 590 593 593 597 599 605 637 Hack Proofing Linux:A Guide to Open Source Security is designed Contents xxv.
... Bastille application to “harden” your Linux operating system so that it can function securely as it fulfills a specific role of your choice (e.g., as a Web server, as an E-mail server, and so forth).You will also learn how to use your ...
... Bastille to FreeSWAN, Kerberos, and firewall troubleshooting utilities, this book shows you how to use your Linux skills to provide the most important security ser- vices such as encryption, authentication, access control, and logging ...
... Bastille s Controlling and Auditing Root Access with Sudo s Managing Your Log Files s Using Logging Enhancers ☑ Summary ☑ Solutions Fast Track ☑ Frequently Asked Questions 41 Introduction Linux is capable of high-end security ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |