Skip to content

Linux System Security

ISBN-10: 0130470112

ISBN-13: 9780130470119

Edition: 2nd 2003 (Revised)

Authors: Scott Mann, Ellen L. Mitchell, Mitchell Krell

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open source version of a popular suite of connectivity tools which allow you to login into remote computers and execute commands on these computers. Open SSH contains encryption capabilities that encrypts all traffic including passwords.
Customers also bought

Book details

List price: $49.99
Edition: 2nd
Copyright year: 2003
Publisher: Prentice Hall PTR
Publication date: 9/18/2002
Binding: Hardcover
Pages: 896
Size: 7.50" wide x 9.75" long x 1.50" tall
Weight: 3.190
Language: English

Preface
How Did That Happen?: Vulnerability Survey
What Happened? So, Are You Going to Show Us
How to Break into Systems?
A Survey of Vulnerabilities and Attacks
Summary
For Further Reading
Imagine That! You're Big Brother!
Security Policies
What Is Computer and Network Security?
Securing Computers and Networks
User Privacy and Administrator Ethics
Summary
For Further Reading
This 'n That: Background Information
BIOS Passwords
Linux Installation and LILO
Start-Up Scripts
Red Hat Package Manager
TCP IP Networking Overview
Request for Comment
Cryptography
Testing and Production Environments
Licenses
Of Course I Trust My Users!
Users, Permissions, and Filesystems
User Account Management
The Root Account
Group Account Management
File and Directory Permissions
Using xlock and xscreensaver
Filesystem Restrictions
Access Control Lists and Extended Attributes
Summary
For Further Reading
Been Cracked?
Just Put PAM on It! Pluggable Authentication Modules
PAM Overview
PAM Administration
PAM Logs
Available PAM Modules
PAM-Aware Applications
Important Notes about Configuring PAM
The Future of PAM
Summary
For Further Reading
Just Once, Only Once! One-Time Passwords
The Purpose of One-Time Passwords
S Key
Which OTP System Should I Use?
S Key Vulnerabilities
Summary
For Further Reading
Bean Counting: System Accounting
General System Accounting
Connection Accounting
Process Accounting
Accounting Files
Summary
For Further Reading
And You Thought Wiretapping Was for the Feds!
System Logging
The syslog System Logging Utility
Other Logs
Alternatives to syslog
The auditd Utility
Summary
For Further Reading
Want To Be Root? Superuser Do (sudo)
What Is sudo? Obtaining and Implementing sudo
Using sudo
PAM and sudo
Disabling root Access
Vulnerabilities of sudo
Summary
For Further Reading
Which Doors Are Open? Securing Network Services: xinetd
Using xinetd
Summary
For Further Reading
Internet Services Resources
Let 'Em Sniff the Net! The Secure Shell
Available Versions of SSH
Overview of SSH Version 1
Overview of SSH Version 2
Installing OpenSSH
Configuring the Secure Shell
Using SSH
Configuring SSH Authentication Behavior
Exploring ssh Functionality
Secure Shell Alternatives
Summary
For Further Reading
So You Think You've Got a Good Password! Crack
Obtaining Crack
Major Components of Crack
Crack Overview
Building Crack
Compiling and Linking Crack
Crack Dictionaries
Using Crack
The White Hat Use of Crack
Summary
For Further Reading
What's Been Happening? Auditing Your System with Bastille
Bastille Overview
Obtaining and Installing Bastille
Configuring Bastille
Duplicating Setup on Additional Hosts
UNDO! Automated Bastille
Summary
Setting the Trap: Tripwire
Tripwire Overview
Obtaining and Installing Tripwire
Tripwire Version 2.3.1-5
Configuring Tripwire
The Tripwire Configuration File
The Tripwire Policy File
The tripwire Command
Initializing the Tripwire Database
Effective Tripwire Initialization
Routine Tripwire Runs3 4Compare Mode
Tripwire Update Mode
Policy Update Mode
Testing Email Notification
Twprint
Summary
For Further Reading
ipchains
What is a Firewall? Packet Filtering
Configuring the Kernel for ipchains
ipchains Overview
Introduction to Using ipchains
Packet Fragments
IP Masquerading
Adding Custom Chains
Antispoofing Rules
Rule Ordering Is Important!
Saving and Restoring Rules
Rule Writing and Logging Tips
Building Your Firewall
ipchains Isn�t Just for Firewalls!
A Few More Things� Supplementary Utilities
The Next Generation� Summary
For Further Reading
We Must Censor!
iptables
Netfilter Overview
The iptables Utility
iptables Examples
Summary
For Further Reading
Who's Watching Now?
Scanners, Sniffers, and Detectors
Introduc