Muutke küpsiste eelistusi

E-raamat: Mastering FreeBSD and OpenBSD Security: Building, Securing, and Maintaining BSD Systems

  • Formaat: 466 pages
  • Sari: O'Reilly Ser.
  • Ilmumisaeg: 24-Mar-2005
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781449369583
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 35,69 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 466 pages
  • Sari: O'Reilly Ser.
  • Ilmumisaeg: 24-Mar-2005
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781449369583
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Intended for established system administrators, this guide provides security-minded walkthroughs of FreeBSD and OpenBSD operating system installation, configuration, and maintenance activities. Separate chapters suggest how to leverage specific BSD features to improve the security posture of DNS servers, firewalls, mail gateways, web servers, auditing procedures, and incident response. All three authors have worked for Cigital, Inc at one time. Annotation ©2005 Book News, Inc., Portland, OR (booknews.com)

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.

There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.

FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.

Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.

Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.

Preface vii
Part I. Security Foundation
The Big Picture
3(29)
What Is System Security?
4(2)
Identifying Risks
6(13)
Responding to Risk
19(4)
Security Process and Principles
23(3)
System Security Principles
26(4)
Wrapping Up
30(1)
Resources
31(1)
BSD Security Building Blocks
32(42)
Filesystem Protections
33(11)
Tweaking a Running Kernel: sysctl
44(9)
The Basic Sandbox: chroot
53(7)
Jail: Beyond chroot
60(7)
Inherent Protections
67(3)
OS Tuning
70(3)
Wrapping Up
73(1)
Resources
73(1)
Secure Installation and Hardening
74(43)
General Concerns
75(12)
Installing FreeBSD
87(6)
FreeBSD Hardening: Your First Steps
93(7)
Installing OpenBSD
100(3)
OpenBSD Hardening: Your First Steps
103(4)
Post-Upgrade Hardening
107(9)
Wrapping Up
116(1)
Resources
116(1)
Secure Administration Techniques
117(56)
Access Control
118(11)
Security in Everyday Tasks
129(12)
Upgrading
141(3)
Security Vulnerability Response
144(5)
Network Service Security
149(14)
Monitoring System Health
163(5)
Wrapping Up
168(1)
Resources
168(5)
Part II. Deployment Situations
Creating a Secure DNS Server
173(34)
The Criticality of DNS
174(9)
DNS Software
183(6)
Installing BIND
189(1)
Installing djbdns
190(3)
Operating BIND
193(8)
Operating djbdns
201(4)
Wrapping Up
205(1)
Resources
205(2)
Building Secure Mail Servers
207(53)
Mail Server Attacks
208(3)
Mail Architecture
211(5)
Mail and DNS
216(2)
SMTP
218(5)
Mail Server Configurations
223(3)
Sendmail
226(15)
Postfix
241(14)
qmail
255(1)
Mail Access
255(3)
Wrapping Up
258(1)
Resources
258(2)
Building a Secure Web Server
260(45)
Web Server Attacks
261(4)
Web Architecture
265(2)
Apache
267(25)
thttpd
292(3)
Advanced Web Servers with Jails
295(7)
Wrapping Up
302(1)
Resources
303(2)
Firewalls
305(31)
Firewall Architectures
305(9)
Host Lockdown
314(1)
The Options: IPFW Versus PF
314(2)
Basic IPFW Configuration
316(9)
Basic PF Configuration
325(6)
Handling Failure
331(3)
Wrapping Up
334(1)
Resources
335(1)
Intrusion Detection
336(27)
No Magic Bullets
336(2)
IDS Architectures
338(7)
NIDS on BSD
345(1)
Snort
346(7)
ACID
353(1)
HIDS on BSD
354(6)
Wrapping Up
360(1)
Resources
360(3)
Part III. Auditing and Incident Response
Managing the Audit Trails
363(33)
System Logging
364(1)
Logging via syslogd
365(13)
Securing a Loghost
378(3)
logfile Management
381(5)
Automated Log Monitoring
386(6)
Automated Auditing Scripts
392(2)
Wrapping Up
394(1)
Resources
394(2)
Incident Response and Forensics
396(19)
Incident Response
396(6)
Forensics on BSD
402(6)
Digging Deeper with the Sleuth Kit
408(4)
Wrapping Up
412(1)
Resources
413(2)
Index 415