Muutke küpsiste eelistusi

SUSE Linux Enterprise [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 450 pages, kõrgus x laius x paksus: 226x180x15 mm, kaal: 635 g, Contains 1 Paperback / softback and 1 DVD video
  • Ilmumisaeg: 01-Oct-2007
  • Kirjastus: Delmar Cengage Learning
  • ISBN-10: 142832223X
  • ISBN-13: 9781428322233
Teised raamatud teemal:
  • Multiple-component retail product
  • Hind: 139,59 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, 450 pages, kõrgus x laius x paksus: 226x180x15 mm, kaal: 635 g, Contains 1 Paperback / softback and 1 DVD video
  • Ilmumisaeg: 01-Oct-2007
  • Kirjastus: Delmar Cengage Learning
  • ISBN-10: 142832223X
  • ISBN-13: 9781428322233
Teised raamatud teemal:
The release of Novell's SUSE Linux Enterprise Server version 10 (SLES 10) marked a new era for the Open Source server. SLES 10 was developed with interoperability in mind. It can be integrated seamlessly into existing network environments, both Open Source and proprietary. It provides a manageable, stable, secure, and affordable network environment. Novell has become an affordable and attractive alternative server operating system for corporate environments. Companies such as Marriott, CNN, Circuit City, HP, Dell, and Publix have adopted SLES 10, and now Industry certification bodies are recognizing the benefits of SLES 10 as well. Security Certified Program, an industry-recognized network security certification body that does training with the Department of Defense, will be adopting SLES 10 in January 2007. With the increased demand for SLES 10 and the absolute necessity of securing networks, there is an increased demand for trained SLES 10 network professionals. SUSE Linux Enterprise Server Security introduces network professionals to the many security features of the new server program, and it contains Course Technology's proven academic pedagogy, making this the ideal classroom solution for teaching Novell.

Arvustused

Introduction Section 1: General Considerations and Definitions of Terms Section 2: Host Security Section 3: AppArmor Section 4: Cryptography: Basics and Practical Application Section 5: Network Security Section 6: General Firewall Design Section 7: Packet Filters Section 8: Application-Level Gateways Section 9: Virtual Private Networks Section 10: Intrusion Detection and Incident Response Section 11: Live Fire Exercise

Introduction xi
SECTION 1 General Considerations and Definition of Terms
1(20)
Objective 1---Create a Security Concept
2(9)
Understand the Basics of a Security Concept
2(2)
Perform a Communication Analysis
4(2)
Analyze the Protection Requirements
6(1)
Analyze the Current Situation and Necessary Enhancements
7(4)
Objective 2---Understand Frequently Used Terms
11(4)
Firewall
11(1)
Secure Network
12(1)
Insecure Network
12(1)
Demilitarized Zone (DMZ)
12(1)
Packet Filters
12(1)
Application-Level Gateway
12(3)
Virtual Private Network
15(1)
Remote Access Service (RAS)
15(1)
Summary
15(1)
Key Terms
16(1)
Review Questions
17(2)
Discovery Exercises
19(2)
SECTION 2 Host Security
21(32)
Objective 1---Limit Physical Access to Server Systems
22(1)
Place the Server in a Separate, Locked Room
22(1)
Secure the BIOS with a Password
22(1)
Secure the GRUB Boot Loader with a Password
22(1)
Objective 2---Partitioning and File System Security
23(4)
Hard Disk Partitioning
24(1)
The Basic Rule for User Write Access
25(1)
The Basic Rule for User Read Access
25(1)
How Special File Permissions Affect System Security
26(1)
Objective 3---Limit the Installed Software Packages
27(1)
Objective 4---Configure Security Settings with YaST
27(1)
Objective 5---Stay Informed about Security Issues
28(1)
Objective 6---Apply Security Updates
29(4)
Configure the Novell Customer Center
30(1)
Use the YaST Online Update
31(2)
Objective 7---Test and Document the Configuration
33(9)
netstat
33(1)
ethereal
34(3)
nmap
37(2)
nessus
39(1)
Documentation
40(2)
Objective 8---Use Logging and Accounting
42(3)
Logging
42(1)
System Activity
42(2)
Process Accounting
44(1)
Tools to Automate Checking of Log Files and Other Information
44(1)
Summary
45(1)
Key Terms
46(2)
Review Questions
48(2)
Discovery Exercises
50(3)
SECTION 3 AppArmor
53(28)
Objective 1---Improve Application Security with AppArmor
54(1)
Objective 2---Create and Manage AppArmor Profiles
55(13)
Understand Profiles and Rules
55(2)
Administer AppArmor Profiles with YaST
57(7)
Administer AppArmor Profiles with Command Line Tools
64(4)
Objective 3---Control AppArmor
68(3)
Start and Stop AppArmor
68(1)
View AppArmor's Status
69(1)
Reload Profiles
70(1)
Objective 4---Monitor AppArmor
71(4)
Security Event Report
71(3)
Security Event Notification
74(1)
Summary
75(1)
Key Terms
76(2)
Review Questions
78(2)
Discovery Exercises
80(1)
SECTION 4 Cryptography: Basics and Practical Application
81(38)
Objective 1---Cryptography Basics
82(5)
Encryption and Decryption
82(3)
Cryptographic Hash Algorithms and Digital Signatures
85(2)
Objective 2---Create a Certification Authority (CA) and Issue Certificates with CLI Tools
87(9)
Create a Root CA
88(2)
Create a Certificate Signed by the Root CA
90(2)
Create a Certificate Revocation List (CRL)
92(4)
Objective 3---Create a Certification Authority (CA) and Issue Certificates with YaST
96(8)
Create a Root CA with YaST
96(4)
Create a Certificate Signed by the CA with YaST
100(3)
Create a CRL with YaST
103(1)
Objective 4---GNU Privacy Guard (GPG)
104(8)
Create a Key Pair
105(1)
Export and Import Public Keys
106(1)
Encrypt and Decrypt Files
107(2)
Use GPG within Kmail
109(3)
Summary
112(1)
Key Terms
113(2)
Review Questions
115(2)
Discovery Exercises
117(2)
SECTION 5 Network Security
119(32)
Objective 1---Understand Services and Protocols
120(9)
Infrastructure
120(3)
Remote Access
123(1)
RPC-Based Services
124(1)
E-mail
125(2)
The World Wide Web
127(1)
File Transfer
128(1)
Wireless Networks
129(1)
Objective 2---Secure Access with TCP Wrapper
129(8)
The Role of the TCP Daemon
130(1)
Configure Access Controls
131(3)
Check the TCP Wrapper
134(1)
Moles and Trappers
134(3)
Objective 3---Use SSL to Secure a Service
137(5)
Objective 4---Secure Clients
142(1)
Summary
143(1)
Key Terms
144(3)
Review Questions
147(2)
Discovery Exercises
149(2)
SECTION 6 General Firewall Design
151(12)
Objective 1---Understand Firewall Concepts and Purpose
152(1)
Objective 2---Describe Components of Firewalls
152(6)
Packet Filter
152(2)
Application-Level Gateway (ALG)
154(1)
Demilitarized Zone (DMZ)
155(3)
Objective 3---Understand Advantages and Disadvantages of Different Setups
158(1)
Packet Filters
158(1)
Application-Level Gateways
158(1)
Caution
158(1)
Summary
159(1)
Key Terms
159(1)
Review Questions
160(2)
Discovery Exercises
162(1)
SECTION 7 Packet Filters
163(34)
Objective 1---Understand Packet Filters
164(3)
TCP/IP Basics
164(1)
Routing
165(1)
Static Packet Filters
165(1)
Dynamic (Stateful) Packet Filters
166(1)
Objective 2---Understand iptables Basics
167(14)
Chains
167(1)
Policies
168(1)
Basic Syntax
168(13)
Objective 3---Understand iptables Advanced Features
181(8)
Matches and Targets
181(3)
User-Defined Chains
184(5)
Objective 4---Understand Network Address Translation
189(1)
Prerouting and Postrouting Chains
189(1)
Types of NAT
189(1)
Summary
190(1)
Key Terms
191(1)
Review Questions
192(2)
Discovery Exercises
194(3)
SECTION 8 Application-Level Gateways
197(62)
Objective 1---Application-Level Gateway Basics
198(1)
The Purpose of Application-Level Gateways
198(1)
How Application-Level Gateways Work
198(1)
Objective 2---Configure and Use Squid
199(36)
Understand the Basics of HTTP
200(1)
Understand How Squid Works
200(1)
Install Squid on SUSE Linux Enterprise Server 10
201(1)
Understand the Squid Configuration File
202(3)
Control Access to Squid
205(5)
Configure Web Browsers to Use Squid
210(6)
Understand How Squid Handles SSL Connections
216(4)
Configure Proxy Authentication
220(8)
Configure URL Filtering
228(5)
Configure an Intercepting Proxy Server
233(1)
Analyze Squid Log Files
234(1)
Objective 3---Configure and Use Dante
235(14)
Understand SOCKS
235(1)
Install and Configure Dante
236(5)
Configure Clients to Use a SOCKS Server
241(8)
Objective 4---Configure and Use rinetd
249(3)
Configure Forwarding Rules
250(1)
Configure Allow and Deny Rules
250(1)
Configure Logging
251(1)
Summary
252(1)
Key Terms
253(2)
Review Questions
255(2)
Discovery Exercises
257(2)
SECTION 9 Virtual Private Networks
259(26)
Objective 1---VPN and IPSec Basics
260(1)
Objective 2---Configure and Establish an IPSec Connection
261(14)
Connect Two Sites with IPSec (Site-to-Site)
262(5)
Connect a Single Computer with a Site (End-to-Site)
267(2)
Connect Two Single Computers (End-to-End)
269(1)
Establish the Connection
270(1)
Test the Connection
271(4)
Objective 3---Understand Packet Filtering of VPN Traffic
275(4)
Filter the IPSec Packets
275(1)
Connections Initiated from Road Warriors to Hosts Behind the Gateway
276(1)
Connections Initiated from Hosts Behind the Gateway to Road Warriors
277(2)
Summary
279(1)
Key Terms
280(1)
Review Questions
281(1)
Discovery Exercises
282(3)
SECTION 10 Intrusion Detection and Incident Response
285(24)
Objective 1---Log Files and Their Evaluation
286(7)
Log to a Remote Host
286(2)
Evaluate Log Files and Run Checks
288(5)
Objective 2---Host-Based Intrusion Detection
293(3)
AIDE
294(2)
rpm
296(1)
Objective 3---Network-Based Intrusion Detection
296(4)
snort
296(1)
arpwatch
297(1)
Argus
297(1)
scanlogd
298(1)
Honeypots
299(1)
Objective 4---Incident Response
300(3)
Immediate Reaction
300(1)
Information
301(1)
Documentation and Investigation
301(1)
New Installation
302(1)
Re-Evaluate Your Security Policy
302(1)
Summary
303(1)
Key Terms
303(2)
Review Questions
305(2)
Discovery Exercises
307(2)
SECTION 11 LiveFire Exercise
309(6)
Scenario
310(1)
Objective 1---Set Up the Application-Level Gateway
311(1)
Objective 2---Set Up the Screening Router
312(1)
Objective 3---Set Up a Web Server in the DMZ
312(1)
Objective 4---Set Up the Mail Server in the LAN
312(1)
Objective 5---Set Up the VPN Gateway
313(2)
Glossary 315(10)
Index 325