Practical UNIX and Internet Security

ISBN-10: 0596003234

ISBN-13: 9780596003234

Edition: 3rd 2003

List price: $54.95 Buy it from $2.49
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

When "Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. "Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and theimportance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
Used Starting from $25.48
New Starting from $39.92
eBooks Starting from $43.99
Rent eBooks
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99
Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $54.95
Edition: 3rd
Copyright year: 2003
Publisher: O'Reilly Media, Incorporated
Publication date: 3/3/2003
Binding: Paperback
Pages: 988
Size: 7.00" wide x 9.00" long x 2.00" tall
Weight: 2.992
Language: English

Preface
Computer Security Basics
Introduction: Some Fundamental Questions
What Is Computer Security?
What Is an Operating System?
What Is a Deployment Environment?
Unix History and Lineage
History of Unix
Security and Unix
Role of This Book
Policies and Guidelines
Planning Your Security Needs
Risk Assessment
Cost-Benefit Analysis and Best Practices
Policy
Compliance Audits
Outsourcing Options
The Problem with Security Through Obscurity
Security Building Blocks
Users, Passwords, and Authentication
Logging in with Usernames and Passwords
The Care and Feeding of Passwords
How Unix Implements Passwords
Network Account and Authorization Systems
Pluggable Authentication Modules (PAM)
Users, Groups, and the Superuser
Users and Groups
The Superuser (root)
The su Command: Changing Who You Claim to Be
Restrictions on the Superuser
Filesystems and Security
Understanding Filesystems
File Attributes and Permissions
chmod: Changing a File's Permissions
The umask
SUID and SGID
Device Files
Changing a File's Owner or Group
Cryptography Basics
Understanding Cryptography
Symmetric Key Algorithms
Public Key Algorithms
Message Digest Functions
Physical Security for Servers
Planning for the Forgotten Threats
Protecting Computer Hardware
Preventing Theft
Protecting Your Data
Story: A Failed Site Inspection
Personnel Security
Background Checks
On the Job
Departure
Other People
Network and Internet Security
Modems and Dialup Security
Modems: Theory of Operation
Modems and Security
Modems and Unix
Additional Security for Modems
TCP/IP Networks
Networking
IP: The Internet Protocol
IP Security
Securing TCP and UDP Services
Understanding Unix Internet Servers and Services
Controlling Access to Servers
Primary Unix Network Services
Managing Services Securely
Putting It All Together: An Example
Sun RPC
Remote Procedure Call (RPC)
Secure RPC (AUTH_DES)
Network-Based Authentication Systems
Sun's Network Information Service (NIS)
Sun's NIS+
Kerberos
LDAP
Other Network Authentication Systems
Network Filesystems
Understanding NFS
Server-Side NFS Security
Client-Side NFS Security
Improving NFS Security
Some Last Comments on NFS
Understanding SMB
Secure Programming Techniques
One Bug Can Ruin Your Whole Day...
Tips on Avoiding Security-Related Bugs
Tips on Writing Network Programs
Tips on Writing SUID/SGID Programs
Using chroot()
Tips on Using Passwords
Tips on Generating Random Numbers
Secure Operations
Keeping Up to Date
Software Management Systems
Updating System Software
Backups
Why Make Backups?
Backing Up System Files
Software for Backups
Defending Accounts
Dangerous Accounts
Monitoring File Format
Restricting Logins
Managing Dormant Accounts
Protecting the root Account
One-Time Passwords
Administrative Techniques for Conventional Passwords
Intrusion Detection Systems
Integrity Management
The Need for Integrity
Protecting Integrity
Detecting Changes After the Fact
Integrity-Checking Tools
Auditing, Logging, and Forensics
Unix Log File Utilities
Process Accounting: The acct/pacct File
Program-Specific Log Files
Designing a Site-Wide Log Policy
Handwritten Logs
Managing Log Files
Unix Forensics
Handling Security Incidents
Discovering a Break-in
Prelude
Discovering an Intruder
Cleaning Up After the Intruder
Case Studies
Protecting Against Programmed Threats
Programmed Threats: Definitions
Damage
Authors
Entry
Protecting Yourself
Preventing Attacks
Denial of Service Attacks and Solutions
Types of Attacks
Destructive Attacks
Overload Attacks
Network Denial of Service Attacks
Computer Crime
Your Legal Options After a Break-in
Criminal Hazards
Criminal Subject Matter
Who Do You Trust?
Can You Trust Your Computer?
Can You Trust Your Suppliers?
Can You Trust People?
Appendixes
Unix Security Checklist
Unix Processes
Paper Sources
Electronic Resources
Organizations
Index
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×