Skip to content

Linux System Security

Spend $50 to get a free DVD!

ISBN-10: 0130470112

ISBN-13: 9780130470119

Edition: 2nd 2003 (Revised)

Authors: Scott Mann, Ellen L. Mitchell, Mitchell Krell

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption;…    
Customers also bought

Book details

List price: $49.99
Edition: 2nd
Copyright year: 2003
Publisher: Prentice Hall PTR
Publication date: 9/18/2002
Binding: Hardcover
Pages: 896
Size: 7.50" wide x 9.75" long x 1.50" tall
Weight: 3.190
Language: English

How Did That Happen?: Vulnerability Survey
What Happened? So, Are You Going to Show Us
How to Break into Systems?
A Survey of Vulnerabilities and Attacks
For Further Reading
Imagine That! You're Big Brother!
Security Policies
What Is Computer and Network Security?
Securing Computers and Networks
User Privacy and Administrator Ethics
For Further Reading
This 'n That: Background Information
BIOS Passwords
Linux Installation and LILO
Start-Up Scripts
Red Hat Package Manager
TCP IP Networking Overview
Request for Comment
Testing and Production Environments
Of Course I Trust My Users!
Users, Permissions, and Filesystems
User Account Management
The Root Account
Group Account Management
File and Directory Permissions
Using xlock and xscreensaver
Filesystem Restrictions
Access Control Lists and Extended Attributes
For Further Reading
Been Cracked?
Just Put PAM on It! Pluggable Authentication Modules
PAM Overview
PAM Administration
PAM Logs
Available PAM Modules
PAM-Aware Applications
Important Notes about Configuring PAM
The Future of PAM
For Further Reading
Just Once, Only Once! One-Time Passwords
The Purpose of One-Time Passwords
S Key
Which OTP System Should I Use?
S Key Vulnerabilities
For Further Reading
Bean Counting: System Accounting
General System Accounting
Connection Accounting
Process Accounting
Accounting Files
For Further Reading
And You Thought Wiretapping Was for the Feds!
System Logging
The syslog System Logging Utility
Other Logs
Alternatives to syslog
The auditd Utility
For Further Reading
Want To Be Root? Superuser Do (sudo)
What Is sudo? Obtaining and Implementing sudo
Using sudo
PAM and sudo
Disabling root Access
Vulnerabilities of sudo
For Further Reading
Which Doors Are Open? Securing Network Services: xinetd
Using xinetd
For Further Reading
Internet Services Resources
Let 'Em Sniff the Net! The Secure Shell
Available Versions of SSH
Overview of SSH Version 1
Overview of SSH Version 2
Installing OpenSSH
Configuring the Secure Shell
Using SSH
Configuring SSH Authentication Behavior
Exploring ssh Functionality
Secure Shell Alternatives
For Further Reading
So You Think You've Got a Good Password! Crack
Obtaining Crack
Major Components of Crack
Crack Overview
Building Crack
Compiling and Linking Crack
Crack Dictionaries
Using Crack
The White Hat Use of Crack
For Further Reading
What's Been Happening? Auditing Your System with Bastille
Bastille Overview
Obtaining and Installing Bastille
Configuring Bastille
Duplicating Setup on Additional Hosts
UNDO! Automated Bastille
Setting the Trap: Tripwire
Tripwire Overview
Obtaining and Installing Tripwire
Tripwire Version 2.3.1-5
Configuring Tripwire
The Tripwire Configuration File
The Tripwire Policy File
The tripwire Command
Initializing the Tripwire Database
Effective Tripwire Initialization
Routine Tripwire Runs3 4Compare Mode
Tripwire Update Mode
Policy Update Mode
Testing Email Notification
For Further Reading
What is a Firewall? Packet Filtering
Configuring the Kernel for ipchains
ipchains Overview
Introduction to Using ipchains
Packet Fragments
IP Masquerading
Adding Custom Chains
Antispoofing Rules
Rule Ordering Is Important!
Saving and Restoring Rules
Rule Writing and Logging Tips
Building Your Firewall
ipchains Isn�t Just for Firewalls!
A Few More Things� Supplementary Utilities
The Next Generation� Summary
For Further Reading
We Must Censor!
Netfilter Overview
The iptables Utility
iptables Examples
For Further Reading
Who's Watching Now?
Scanners, Sniffers, and Detectors