Linux Security (Craig Hunt Linux Library)

Linux Security (Craig Hunt Linux Library)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 482 p.
  • 言語 ENG
  • 商品コード 9780782127416
  • DDC分類 005.8

Full Description


This book provides authoritative answers to all your Linux Security Questions. Specifically for Linux Administrators, this is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, "Linux Security" teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail - so you stay on track and accomplish all your goals. The coverage includes: understanding information and system security procedures; developing a corporate security policy; designing and deploying an effective system and network monitoring strategy; managing the network services offered by Linux servers; and understanding Sendmail security, including authentication and privacy; providing application-level mail security using PGP; and designing and deploying an Apache HTTP server, including SSL extensions, securing your Samba server, building a network layer firewall using IPtables and Linux kernel v.2.4, using the NEC SOCKS5 transport layer firewall, deploying the TIS firewall toolkit, offering secure remote connectivity with IPsec and PPTP VPNs, adding strong user authentication to Linux servers using Kerberos, and understanding the Linux Pluggable Authentication Modules (PAM).

Contents

Contents at a Glance. Introduction. Part 1 System Security. Chapter 1 Understanding Linux Security. Chapter 2 System Installation and Setup. Chapter 3 System Monitoring and Auditing. Part 2 Network Security. Chapter 4 Network Services Configuration. Chapter 5 Network Auditing and Monitoring. Part 3 Application Security. Chapter 6 Electronic Mail. Chapter 7 HTTP Services. Chapter 8 Samba Security. Part 4 Perimeter Security. Chapter 9 Network Layer Firewalls. Chapter 10 Transport Layer Firewalls. Chapter 11 Application Layer Firewalls. Part 5 Remote Access and Authentication. Chapter 12 Virtual Private Networking. Chapter 13 Strong User Authentication. Appendices. Appendix A Other Sources of Information. Appendix B PAM Module Reference. Index.