Foreword |
|
xiii | |
Preface |
|
xv | |
Acknowledgments |
|
xxiii | |
About the Author |
|
xxv | |
|
1 Overall Security Concepts |
|
|
1 | (24) |
|
Section 1 Security Fundamentals |
|
|
1 | (9) |
|
Essential Security Principles |
|
|
2 | (2) |
|
|
4 | (6) |
|
Section 2 Security Practices Against a Knowledgeable Attacker |
|
|
10 | (10) |
|
|
10 | (3) |
|
Password-Cracking Techniques |
|
|
13 | (3) |
|
Password-Cracking Countermeasures |
|
|
16 | (4) |
|
Section 3 Security Practices Against an Advanced Attacker |
|
|
20 | (5) |
|
Advanced Password-Cracking Techniques |
|
|
20 | (2) |
|
Advanced Password-Cracking Countermeasures |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
25 | (28) |
|
Section 1 Security Fundamentals |
|
|
25 | (8) |
|
Workstation Security Fundamentals |
|
|
25 | (2) |
|
Web Security Fundamentals |
|
|
27 | (2) |
|
|
29 | (1) |
|
Download, Validate, and Install Tails |
|
|
29 | (1) |
|
|
30 | (3) |
|
Section 2 Additional Workstation Hardening |
|
|
33 | (4) |
|
Workstation Disk Encryption |
|
|
33 | (1) |
|
|
33 | (1) |
|
Tails Persistence and Encryption |
|
|
34 | (3) |
|
|
37 | (16) |
|
|
38 | (3) |
|
Qubes Download and Installation |
|
|
41 | (2) |
|
|
43 | (3) |
|
An AppVM Compartmentalization Example |
|
|
46 | (3) |
|
|
49 | (1) |
|
|
50 | (3) |
|
|
53 | (22) |
|
Section 1 Server Security Fundamentals |
|
|
53 | (5) |
|
Fundamental Server Security Practices |
|
|
53 | (1) |
|
|
54 | (4) |
|
Section 2 Intermediate Server-Hardening Techniques |
|
|
58 | (10) |
|
|
58 | (5) |
|
|
63 | (3) |
|
|
66 | (2) |
|
Section 3 Advanced Server-Hardening Techniques |
|
|
68 | (7) |
|
|
68 | (2) |
|
|
70 | (2) |
|
Two-Factor Authentication with SSH |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
75 | (34) |
|
Section 1 Essential Network Hardening |
|
|
76 | (11) |
|
Network Security Fundamentals |
|
|
76 | (2) |
|
Man-in-the-Middle Attacks |
|
|
78 | (1) |
|
|
79 | (8) |
|
Section 2 Encrypted Networks |
|
|
87 | (13) |
|
|
87 | (6) |
|
|
93 | (2) |
|
SSL/TLS-Enabled Load Balancing |
|
|
95 | (5) |
|
Section 3 Anonymous Networks |
|
|
100 | (9) |
|
|
101 | (5) |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
109 | (24) |
|
Section 1 Web Server Security Fundamentals |
|
|
109 | (4) |
|
|
109 | (1) |
|
HTTP Basic Authentication |
|
|
110 | (3) |
|
|
113 | (5) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
HTTPS Client Authentication |
|
|
117 | (1) |
|
Section 3 Advanced HTTPS Configuration |
|
|
118 | (15) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Web Application Firewalls |
|
|
120 | (11) |
|
|
131 | (2) |
|
|
133 | (24) |
|
Section 1 Essential Email Hardening |
|
|
133 | (4) |
|
Email Security Fundamentals |
|
|
134 | (1) |
|
|
135 | (2) |
|
Section 2 Authentication and Encryption |
|
|
137 | (4) |
|
|
138 | (1) |
|
|
139 | (2) |
|
Section 3 Advanced Hardening |
|
|
141 | (16) |
|
|
141 | (5) |
|
|
146 | (6) |
|
|
152 | (4) |
|
|
156 | (1) |
|
|
157 | (64) |
|
Section 1 DNS Security Fundamentals |
|
|
158 | (3) |
|
Authoritative DNS Server Hardening |
|
|
159 | (1) |
|
Recursive DNS Server Hardening |
|
|
160 | (1) |
|
Section 2 DNS Amplification Attacks and Rate Limiting |
|
|
161 | (5) |
|
|
162 | (1) |
|
Dynamic DNS Authentication |
|
|
163 | (3) |
|
|
166 | (55) |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
168 | (3) |
|
|
171 | (1) |
|
|
172 | (3) |
|
|
175 | (46) |
|
|
221 | (8) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
TLS Troubleshooting Commands |
|
|
224 | (1) |
|
View the Contents of a Certificate |
|
|
224 | (1) |
|
View the Contents of a CSR |
|
|
224 | (1) |
|
Troubleshoot a Protocol over TLS |
|
|
224 | (1) |
|
|
224 | (1) |
|
Man-in-the-Middle Attacks |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (3) |
Index |
|
229 | |