Real world linux security:intrusion prevention detection & recovery
Résumé
"A comprehensive guide to system security---covers everything from hardening a system to system recovery after an attack."
-Steve Bourne, Creator of the Bourne Shell
Your enemy is coming-are you ready?
It's nota question of "if" but "when." Will you be readyto
protectyour system when a cracker comes to call' Real Worid
Linux Security goes beyond the books that merely cetail
system vulnerabilities; it offers system administrators
practical solutions for safeguarding Linux systems and
actively responding to break-in attempts. Veteran Bob Toxen
shows you how to know your enemies and stop them at the
front gate before they can damage your system.
The hands-on guide to protecting your linux data-and
yourself
-7 Deadly of Linux security
-Set up effective firewalls
-Break-in case studies
-Develop internal security policies
-Block spam
-Recover quickly from an intrusion
ABOUT THE CD-ROM The accompanying CD contains
original software that locks out crackers and alerts system
administrators. In addition, it includes programs that
monitor system health and report suspicious activities,
detect network sniffers, and speed backup and
recovery.
Table of Contents
- Introduction
- Securing your system
- Quick fixes for common problems
- Quick and easy break-ind and how to avoid them
- Common break-ins by subsystem
- Common attacks
- Advanced security issues
- Establishing security policies
- Trusting other computers
- Gutsy Break-ins
- Case studies
- Recent Break-ins
- Preparing for an intusion
- Hardening your system
- Preparing your hardware
- Prepating your configuration
- Scanning your own system
- Detecting an intusion
- Monitoring activity
- Scanning From an Intrusion
- Regaining control of your system
- Finding and repairing the damage
- Finding the Attacker's system
- Having the cracker crack roks
- Internet resources for the latest
- Inrusions and defenses
- Books, CD-Roms and videos
- Appendix C
- Network services and ports
- Appendix D The ports C Listing
- Appendix E
- The Blockip CSH Listing
- Appendix F
- The fpromisc.CSH Listing
- Appendix G
- The overwrite Listing
- Appendix H
- Danger Levels
L'auteur - Bob Toxen
Bob Toxen has 26 years of UNIX/Linux experience, and is one of the 168 recognized developers of Berkeley UNIX. He learned about security as a student at UC Berkeley, when he played for "the other team," successfully cracking several of the original UNIX systems there. He is president of Fly-By-Day Consulting, specializing in Linux security, client/server creation, system administration, porting, and C programming.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Bob Toxen |
Parution | 15/09/2000 |
Nb. de pages | 694 |
Format | 17,8 x 23,4 |
Couverture | Broché |
Poids | 1186g |
Intérieur | Noir et Blanc |
EAN13 | 9780130281876 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse