Linux System Security: An Administrator's Guide to Open Source Security Tools

Pirmais vāks
Prentice Hall Professional, 2000 - 564 lappuses
-- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised.

-- New chapter on network sniffers and port scanners used to detect intruders.

-- Updated for Redhat 7.2.

As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open source version of a popular suite of connectivity tools which allow you to login into remote computers and execute commands on these computers. Open SSH contains encryption capabilities that encrypts all traffic including passwords.

No grāmatas satura

Saturs

How Did That Happen?
1
Imagine That Youre Big Brother
11
This n That
21
Of Course I Trust My Users
57
Been Cracked? Just Put PAM On It
81
Just Once Only Once
117
Bean Counting
149
And You Thought Wiretapping Was for the Feds
159
Whats Been Happening?
341
Setting the Trap
381
Space the Cracker Frontier
405
We Must Censor
435
Wiretapping Is Not So Much Fun After All
491
This Is an Awful Lot of Work
515
Keeping Up to Date
529
Tools Not Covered
543

Want to Be root?
173
Which Doors Are Open?
193
Let Em Sniff the Net
257
So You Think Youve Got a Good Password
313
Glossary
547
Index
555
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Atsauces uz šo grāmatu

Par autoru (2000)

Scott Mann currently works for SGI, specializing in Linux systems. Previously he worked for four years in Systems Engineering at Sun Microsystems. Mann resides in Golden, CO.

Bibliogrāfiskā informācija