Linux Security (Craig Hunt Linux Library)

Linux Security (Craig Hunt Linux Library)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 482 p.
  • 言語 ENG,ENG
  • 商品コード 9780782127416
  • DDC分類 005.8

Full Description


This book provides authoritative answers to all your Linux Security Questions. Specifically for Linux Administrators, this is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, "Linux Security" teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail - so you stay on track and accomplish all your goals. The coverage includes: understanding information and system security procedures; developing a corporate security policy; designing and deploying an effective system and network monitoring strategy; managing the network services offered by Linux servers; and understanding Sendmail security, including authentication and privacy; providing application-level mail security using PGP; and designing and deploying an Apache HTTP server, including SSL extensions, securing your Samba server, building a network layer firewall using IPtables and Linux kernel v.2.4, using the NEC SOCKS5 transport layer firewall, deploying the TIS firewall toolkit, offering secure remote connectivity with IPsec and PPTP VPNs, adding strong user authentication to Linux servers using Kerberos, and understanding the Linux Pluggable Authentication Modules (PAM).

Table of Contents

Introduction                                       xxi
Part 1 System Security 1 (92)
Understanding Linux Security 3 (28)
System Installation and Setup 31 (32)
System Monitoring and Auditing 63 (30)
Part 2 Network Security 93 (62)
Network Services Configuration 95 (30)
Network Auditing and Monitoring 125(30)
Part 3 Application Security 155(90)
Electronic Mail 157(28)
HTTP Services 185(34)
Samba Security 219(26)
Part 4 Perimeter Security 245(100)
Network Layer Firewalls 247(34)
Transport Layer Firewalls 281(36)
Application Layer Firewalls 317(28)
Part 5 Remote Access and Authentication 345(84)
Virtual Private Networking 347(40)
Strong User Authentication 387(42)
Appendices 429(22)
Appendix A Other Sources of Information 429(6)
Appendix B PAM Module Reference 435(16)
Index 451