Linux System Security: An Administrator's Guide to Open Source Security ToolsPrentice Hall Professional, 2000 - 564 lappuses -- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised. -- New chapter on network sniffers and port scanners used to detect intruders. -- Updated for Redhat 7.2. As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open source version of a popular suite of connectivity tools which allow you to login into remote computers and execute commands on these computers. Open SSH contains encryption capabilities that encrypts all traffic including passwords. |
No grāmatas satura
1.–5. rezultāts no 62.
... Applications............................................. 28 30 36 Trusted Host Files and Related Some Major Applications ...........................................
... ........................................................109 PAM-Aware Applications ..................................................................112 Important Notes about Configuring PAM...........................
... ........................................................ 306 Port Forwarding and Application Proxying................................ 307 Secure Shell Alternatives..............................................................
... .................................317 Fig. 12.3 Flow of the Application of Rules to a Dictionary Word................................336 Fig. 13.1 The tiger Directory Tree .....................................................
Atvainojiet, šīs lappuses saturs ir ierobežots..
Saturs
How Did That Happen? | 1 |
Imagine That Youre Big Brother | 11 |
This n That | 21 |
Of Course I Trust My Users | 57 |
Been Cracked? Just Put PAM On It | 81 |
Just Once Only Once | 117 |
Bean Counting | 149 |
And You Thought Wiretapping Was for the Feds | 159 |
Whats Been Happening? | 341 |
Setting the Trap | 381 |
Space the Cracker Frontier | 405 |
We Must Censor | 435 |
Wiretapping Is Not So Much Fun After All | 491 |
This Is an Awful Lot of Work | 515 |
Keeping Up to Date | 529 |
Tools Not Covered | 543 |
Want to Be root? | 173 |
Which Doors Are Open? | 193 |
Let Em Sniff the Net | 257 |
So You Think Youve Got a Good Password | 313 |
Glossary | 547 |
555 | |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Surviving Security: How to Integrate People, Process, and Technology Amanda Andress Ierobežota priekšskatīšana - 2003 |