Section 6.1. DNS Basics Section 6.2. DNS Security Principles Section 6.3. Selecting a DNS Software Package Section 6.4. Securing BIND Section 6.5. djbdns Section 6.6. Resources Chapter 7. Using LDAP for Authentication Section 7.1. LDAP Basics Section 7.2. Setting Up the Server Section 7.3. LDAP Database Management Section 7.4. Conclusions Section 7.5. Resources Chapter 8. Database Security Section 8.1. Types of Security Problems Section 8.2. Server Location Section 8.3. Server Installation Section 8.4. Database Operation Section 8.5. Resources Chapter 9. Securing Internet Email Section 9.1. Background: MTA and SMTP Security Section 9.2. Using SMTP Commands to Troubleshootand Test SMTP Servers Section 9.3. Securing Your MTA Section 9.4. Sendmail Section 9.5. Postfix Section 9.6. Mail Delivery Agents Section 9.7. A Brief Introduction to Email Encryption Section 9.8. Resources Chapter 10. Securing Web Servers Section 10.1. Web Security Section 10.2. The Web Server Section 10.3. Web Content Section 10.4. Web Applications Section 10.5. Layers of Defense Section 10.6. Resources Chapter 11. Securing File Services Section 11.1. FTP Security Section 11.2. Other File-Sharing Methods Section 11.3. Resources Chapter 12. System Log Management and Monitoring Section 12.1. syslog Section 12.2. Syslog-ng Section 12.3. Testing System Logging with logger Section 12.4. Managing System Logfiles with logrotate Section 12.5. Using Swatch for Automated Log Monitoring Section 12.6. Some Simple Log-Reporting Tools Section 12.7. Resources Chapter 13. Simple Intrusion Detection Techniques Section 13.1. Principles of Intrusion Detection Systems Section 13.2. Using Tripwire Section 13.3. Other Integrity Checkers Section 13.4. Snort Section 13.5. Resources Colophon