
Michael D. Bauer Publisher: O'ReillyPub Date: January 2005ISBN: 0-596-00670-5Pages: 542
Copyright
dedication Dedication
Preface
What This Book Is About
The Paranoid Penguin Connection
The Second Edition
Audience
What This Book Doesn''t Cover
Assumptions This Book Makes
Organization of This Book
Conventions Used in This Book
Safari® Enabled
How to Contact Us
Using Code Examples
Acknowledgments
Chapter 1.
Threat Modeling and Risk Management
Section 1.1.
Components of Risk
Section 1.2.
Simple Risk Analysis: ALEs
Section 1.3.
An Alternative: Attack Trees
Section 1.4.
Defenses
Section 1.5.
Conclusion
Section 1.6.
Resources
Chapter 2.
Designing Perimeter Networks
Section 2.1.
Some Terminology
Section 2.2.
Types of Firewall and DMZ Architectures
Section 2.3.
Deciding What Should Reside on the DMZ
Section 2.4.
Allocating Resources in the DMZ
Section 2.5.
The Firewall
Chapter 3.
Hardening Linux and Using iptables
Section 3.1.
OS Hardening Principles
Section 3.2.
Automated Hardening with Bastille Linux
Chapter 4.
Secure Remote Administration
Section 4.1.
Why It''s Time to Retire Cleartext Admin Tools
Section 4.2.
Secure Shell Background and Basic Use
Section 4.3.
Intermediate and Advanced SSH
Chapter 5.
OpenSSL and Stunnel
Section 5.1.
Stunnel and OpenSSL: Concepts
Chapter 6.
Securing Domain Name Services (DNS)
Section 6.1.
DNS Basics
Section 6.2.
DNS Security Principles
Section 6.3.
Selecting a DNS Software Package
Section 6.4.
Securing BIND
Section 6.5.
djbdns
Section 6.6.
Resources
Chapter 7.
Using LDAP for Authentication
Section 7.1.
LDAP Basics
Section 7.2.
Setting Up the Server
Section 7.3.
LDAP Database Management
Section 7.4.
Conclusions
Section 7.5.
Resources
Chapter 8.
Database Security
Section 8.1.
Types of Security Problems
Section 8.2.
Server Location
Section 8.3.
Server Installation
Section 8.4.
Database Operation
Section 8.5.
Resources
Chapter 9.
Securing Internet Email
Section 9.1.
Background: MTA and SMTP Security
Section 9.2.
Using SMTP Commands to Troubleshootand Test SMTP Servers
Section 9.3.
Securing Your MTA
Section 9.4.
Sendmail
Section 9.5.
Postfix
Section 9.6.
Mail Delivery Agents
Section 9.7.
A Brief Introduction to Email Encryption
Section 9.8.
Resources
Chapter 10.
Securing Web Servers
Section 10.1.
Web Security
Section 10.2.
The Web Server
Section 10.3.
Web Content
Section 10.4.
Web Applications
Section 10.5.
Layers of Defense
Section 10.6.
Resources
Chapter 11.
Securing File Services
Section 11.1.
FTP Security
Section 11.2.
Other File-Sharing Methods
Section 11.3.
Resources
Chapter 12.
System Log Management and Monitoring
Section 12.1.
syslog
Section 12.2.
Syslog-ng
Section 12.3.
Testing System Logging with logger
Section 12.4.
Managing System Logfiles with logrotate
Section 12.5.
Using Swatch for Automated Log Monitoring
Section 12.6.
Some Simple Log-Reporting Tools
Section 12.7.
Resources
Chapter 13.
Simple Intrusion Detection Techniques
Section 13.1.
Principles of Intrusion Detection Systems
Section 13.2.
Using Tripwire
Section 13.3.
Other Integrity Checkers
Section 13.4.
Snort
Section 13.5.
Resources
Colophon