Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 66.
... Alerts, and Exercises! • Bonus Wallet CD with Configuration Examples, Packet Captures, and Programs James Stanger, Ph.D. Patrick T. Lane Edgar Danielyan Technical Editor TM solutions@syngress.com With more than 1,500,000 copies of our ...
... FastTrack Frequently Asked Questions 146 147 147 148 151 153 154 154 155 157 157 159 160 165 167 169 169 170 173 174 174 175 179 180 182 185 185 189 SECURITY ALERT! Although Tripwire has a “file integrity mode,” Tripwire Contents xv.
A Guide to Open Source Security James Stanger, Patrick T. Lane. SECURITY ALERT! Although Tripwire has a “file integrity mode,” Tripwire is not really an integrity checker in the classic sense. It does not, for example, test the file's ...
... Alerts 239 Getting Information 240 Exercise: Installing Snort 240 Exercise: Using Snort as an IDS Application 241 Exercise: Configuring Snort to Log to a Database 243 Exercise: Querying a Snort Database from a Remote Host 251 ...
... Alert Options Firewall Log Daemon Obtaining Firelogd Syntax and Configuration Options Message Format Customizing Messages Reading Log Files Generated by Other Firewalls 543 544 544 546 546 547 547 548 548 549 549 550 551 551 552 552 554 ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |