Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 50.
... Firewall Utilities 452 452 453 456 458 460 460 461 462 463 464 467 468 468 470 s s s s 471 471 472 472 473 475 477 478 478 479 483 484 484 486 488 Configure Squid with the /etc/squid/ squid.conf file Firewall Works in xxii Contents.
... squid/ squid.conf file Firewall Works in Progress Exercise: Using Firestarter to Create a Personal Firewall Exercise: Using Advanced Firestarter Features Summary Solutions FastTrack Frequently Asked Questions Chapter 10 Deploying the ...
... Squid proxy server and Ipchains/Iptables will help you use your Linux system so that it can act as a firewall.With the tools on the accompanying CD as well as the advice and instructions given in this book, you will be able to deploy ...
... Squid so that you can more carefully monitor and process packets. Finally, Chapter 11 provides you with tools that test your firewall implementation. The open source community has fulfilled the need for a www.syngress.com xxviii Preface.
... Squid proxy server to control client access to the Internet.You will also learn how to con- figure Linux clients to access the proxy server. Finally, Chapter 11, shows how to troubleshoot and counteract problems with your network ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |