Linux Server Security (2nd Edition( [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Server Security (2nd Edition( [Electronic resources] - نسخه متنی

Michael D. Bauer

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Organization of This Book


This book provides a comprehensive approach to security by giving you
guidelines for securing a system along with configuration details for
particular services.


Chapter 1
, Threat Modeling and Risk Management,
introduces the proper attitude and mental habits for thinking
securely, including two systematic ways to assess risk: Annualized
Loss Expectancies and Attack Trees.


Chapter 2
, Designing Perimeter Networks,
describes where in your network topology to place firewalls and
bastion hosts.

Chapter 3, Hardening Linux and Using iptables,
is a major chapter that shows you how to close up security holes on
the operating system level, check your work with nmap and Nessus port
scans, create firewalls for servers, and run Bastille.

Chapter 4, Secure Remote Administration, covers
secure logins, including ssh and an introduction
to encryption.

Chapter 5, OpenSSL and Stunnel, is an in-depth
discussion of setting up a certificate authority and creating virtual
private network connections.

Chapter 6, Securing Domain Name Services (DNS),
gives comprehensive guidelines for securing both BIND and the most
popular alternative, djbdns.

Chapter 7, Using LDAP For Authentication,
introduced OpenLDAP and explains its place in user authentication.

Chapter 8, Database Security, covers general
considerations for running a database securely, along with details on
the MySQL database.

Chapter 9, Securing Internet Email, covers the
extensive security-related options in Sendmail, Postfix, and Cyrus
IMAP. SASL, SMTP AUTH, and email encryption are covered.

Chapter 10, Securing Web Servers, is an in-depth
approach to the many risks and solutions involved in running Apache,
Perl and PHP CGI scripts, and other dynamic features of web sites.

Chapter 11, Securing File Services, explains how
to configure the ProFTPD and vsftpd FTP servers and how to use
rsync.

Chapter 12, System Log Management and
Monitoring, covers the use of syslog and Syslog-ng for
logging and Swatch for automated logfile monitoring.

Chapter 13, Simple Intrusion Detection
Techniques, introduces the complex field of intrusion
detection and offers in-depth coverage of Tripwire and Snort.

The Appendix, Two Complete iptables Startup
Scripts, provides models for creating firewalls.


/ 94