Skip to content

Linux Server Security

Spend $50 to get a free DVD!

ISBN-10: 0596006705

ISBN-13: 9780596006709

Edition: 2nd 2005

Authors: Michael D. Bauer

List price: $44.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled "Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden…    
Customers also bought

Book details

List price: $44.95
Edition: 2nd
Copyright year: 2005
Publisher: O'Reilly Media, Incorporated
Publication date: 1/28/2005
Binding: Paperback
Pages: 544
Size: 7.00" wide x 9.00" long x 1.00" tall
Weight: 1.694
Language: English

Michael D. (Mick) Bauer, CISSP, is Network Security Architect for alarge financial services provider. He is also Security Editor forLinux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security assessment, and the development of security policies and awareness programs.

Copyright
Dedication
Preface
Threat Modeling and Risk Management
Designing Perimeter Networks
Hardening Linux and Using iptables
Secure Remote Administration
OpenSSL and Stunnel
Securing Domain Name Services (DNS)
Using LDAP for Authentication
Database Security
Securing Internet Email
Securing Web Servers
Securing File Services
System Log Management and Monitoring
Simple Intrusion Detection Techniques
Two Complete iptables Startup Scripts
Colophon