Muutke küpsiste eelistusi

E-raamat: Linux Server Security: Tools & Best Practices for Bastion Hosts

  • Formaat: 542 pages
  • Sari: O'Reilly Ser.
  • Ilmumisaeg: 18-Jan-2005
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9780596517991
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 29,84 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 542 pages
  • Sari: O'Reilly Ser.
  • Ilmumisaeg: 18-Jan-2005
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9780596517991
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Provides advice on ways to ensure network security, covering such topics as DNS, Apache web server, OpenLDAP, email encryption, Cyrus IMAP service, and FTP server.

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.A number of new security topics have been added for this edition, including:

  • Database security, with a focus on MySQL
  • Using OpenLDAP for authentication
  • An introduction to email encryption
  • The Cyrus IMAP service, a popular mail delivery agent
  • The vsftpd FTP server
Geared toward Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Linux Server Security with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.
Preface ix
1. Threat Modeling and Risk Management
1(20)
Components of Risk
2(9)
Simple Risk Analysis: ALEs
11(4)
An Alternative: Attack Trees
15(3)
Defenses
18(2)
Conclusion
20(1)
Resources
20(1)
2. Designing Perimeter Networks
21(22)
Some Terminology
22(2)
Types of Firewall and DMZ Architectures
24(5)
Deciding What Should Reside on the DMZ
29(1)
Allocating Resources in the DMZ
30(2)
The Firewall
32(11)
3. Hardening Linux and Using iptables
43(74)
OS Hardening Principles
44(67)
Automated Hardening with Bastille Linux
111(6)
4. Secure Remote Administration
117(26)
Why It's Time to Retire Cleartext Admin Tools
117(1)
Secure Shell Background and Basic Use
118(10)
Intermediate and Advanced SSH
128(15)
5. OpenSSL and Stunnel
143(25)
Stunnel and OpenSSL: Concepts
143(25)
6. Securing Domain Name Services (DNS)
168(47)
DNS Basics
168(2)
DNS Security Principles
170(2)
Selecting a DNS Software Package
172(1)
Securing BIND
173(21)
djbdns
194(18)
Resources
212(3)
7. Using LDAP for Authentication
215(22)
LDAP Basics
215(5)
Setting Up the Server
220(9)
LDAP Database Management
229(6)
Conclusions
235(1)
Resources
235(2)
8. Database Security
237(14)
Types of Security Problems
238(1)
Server Location
238(3)
Server Installation
241(5)
Database Operation
246(4)
Resources
250(1)
9. Securing Internet Email
251(63)
Background: MTA and SMTP Security
252(3)
Using SMTP Commands to Troubleshoot and Test SMTP Servers
255(2)
Securing Your MTA
257(1)
Sendmail
257(28)
Postfix
285(8)
Mail Delivery Agents
293(15)
A Brief Introduction to Email Encryption
308(3)
Resources
311(3)
10. Securing Web Servers 314(47)
Web Security
314(2)
The Web Server
316(11)
Web Content
327(10)
Web Applications
337(22)
Layers of Defense
359(1)
Resources
359(2)
11. Securing File Services 361(45)
FTP Security
361(31)
Other File-Sharing Methods
392(13)
Resources
405(1)
12. System Log Management and Monitoring 406(44)
syslog
406(11)
Syslog-ng
417(18)
Testing System Logging with logger
435(1)
Managing System Logfiles with logrotate
436(3)
Using Swatch for Automated Log Monitoring
439(9)
Some Simple Log-Reporting Tools
448(1)
Resources
449(1)
13. Simple Intrusion Detection Techniques 450(36)
Principles of Intrusion Detection Systems
451(3)
Using Tripwire
454(15)
Other Integrity Checkers
469(3)
Snort
472(14)
Resources 486(3)
Appendix: Two Complete iptables Startup Scripts 489(12)
Index 501
Michael D. Bauer is a network and Unix systems security consultant for Upstream Solutions, Inc. in Minneapolis, Minnesota. He is also Security Editor for Linux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security auditing, and the development of security policies and awareness programs.