Sitemap
Table of Contents
Copyright
dedication Dedication
Preface
What This Book Is About
The Paranoid Penguin Connection
The Second Edition
Audience
What This Book Doesn't Cover
Assumptions This Book Makes
Organization of This Book
Conventions Used in This Book
Safari® Enabled
How to Contact Us
Using Code Examples
Acknowledgments
Chapter 1. Threat Modeling and Risk Management
Section 1.1. Components of Risk
Section 1.2. Simple Risk Analysis: ALEs
Section 1.3. An Alternative: Attack Trees
Section 1.4. Defenses
Section 1.5. Conclusion
Section 1.6. Resources
Chapter 2. Designing Perimeter Networks
Section 2.1. Some Terminology
Section 2.2. Types of Firewall and DMZ Architectures
Section 2.3. Deciding What Should Reside on the DMZ
Section 2.4. Allocating Resources in the DMZ
Section 2.5. The Firewall
Chapter 3. Hardening Linux and Using iptables
Section 3.1. OS Hardening Principles
Section 3.2. Automated Hardening with Bastille Linux
Chapter 4. Secure Remote Administration
Section 4.1. Why It's Time to Retire Cleartext Admin Tools
Section 4.2. Secure Shell Background and Basic Use
Section 4.3. Intermediate and Advanced SSH
Chapter 5. OpenSSL and Stunnel
Section 5.1. Stunnel and OpenSSL: Concepts
Chapter 6. Securing Domain Name Services (DNS)