Hack Proofing Sun Solaris 8

個数:

Hack Proofing Sun Solaris 8

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 608 p.
  • 言語 ENG
  • 商品コード 9781928994442
  • DDC分類 005.8

Full Description


The only way to stop a hacker is to think like one!Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers?Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.

Contents

Foreword Chapter 1 Introducing Solaris Security: Evaluating Your Risk Introduction Exposing Default Solaris Security Levels Altering Default Permissions Making Services Available after Installation Working with Default Environmental Settings Evaluating Current Solaris Security Configurations Evaluating Network Services Evaluating Network Processes Monitoring Solaris Systems Using the sdtprocess and sdtperfmeter Applications Monitoring Solaris Logfiles Testing Security Testing Passwords Testing File Permissions Securing against Physical Inspections Securing OpenBoot Documenting Security Procedures and Configurations Documenting Security Procedures Documenting System Configurations Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Securing Solaris with the Bundled Security Tools Introduction The Orange Book Choosing Solaris 8 C2 Security Configuring Auditing Managing the Audit Log Understanding Auditing Classifications Configuring Auditing Extracting and Analyzing Auditing Data Choosing Trusted Solaris 8 Using Trusted Solaris 8's B1-Level Security Understanding the Concept of Mandatory Access Control Administrative Labels Auditing and Analyzing Trusted Solaris 8 Solaris 8 Security Enhancements Using SunScreen Secure Net Utilizing SunScreen SKIP Using the Solaris Security Toolkit Using OpenSSH Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Securing Solaris with Freeware Security Tools Introduction Detecting Vulnerabilities with Portscanning Advanced Portscanning Discovering Unauthorized Systems Using IP Scanning Using the arp Command on Solaris Detecting Unusual Traffic with Network Traffic Monitoring Using Snoop Using Snort Using a Dedicated Sniffer Using Sudo Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Securing Your Users Introduction Creating Secure Group Memberships Role-Based Access Control Understanding Solaris User Authentication Authenticating Users with NIS and NIS+ Authenticating Users with Kerberos Authenticating Users with the Pluggable Authentication Modules Summary Solutions Fast Track Frequently Asked Questions Chapter 5 Securing Your Files Introduction Establishing Permissions and Ownership Access Control Lists Role-Based Access Control Changing Default Settings Using NFS Share and Share Alike Locking Down FTP Services Using Samba Monitoring and Auditing File Systems Summary 1Solutions Fast Track Frequently Asked Questions Chapter 6 Securing Your Network Introduction Configuring Solaris as a DHCP Server Using the dhcpmgr GUI Configuration Tool Using the dhcpconfig Command-Line Tool Securing DNS Services on Solaris Using BIND Configuring Solaris to Provide Anonymous FTP ServicesUsing X-Server Services Securely Using Host-Based Authentication Using User-Based Authentication Using X-Windows Securely with SSH Using Remote Commands Using Built-In Remote Access Methods Using SSH for Remote Access Summary Solutions Fast Track Frequently Asked Questions Chapter 7 Providing Secure Web and Mail Services Introduction Configuring the Security Features of an Apache Web Server Limiting CGI Threats Using Virtual Hosts Monitoring Web Page Usage and Activity Configuring the Security Features of Sendmail Stopping the Relay-Host Threat Tracking Attachments Summary Solutions Fast Track Frequently Asked Questions Chapter 8 Configuring Solaris as a Secure Router and Firewall Introduction Configuring Solaris as a Secure Router Reasoning and Rationale Routing Conditions Configuring for Routing Security OptimizationSecurity Implications Unconfiguring Solaris Routing Routing IP Version 6 Configuration Files IPv6 Programs IPv6 Router Procedure Stopping IPv6 Routing IP Version 6 Hosts Automatic Configuration Manual Configuration Configuring Solaris as a Secure Gateway Configuring Solaris as a Firewall General Firewall Theory General Firewall Design SunScreen Lite IP Filter Using NAT Guarding Internet Access with Snort Snort Configuration File Snort Log Analysis Summary Solutions Fast Track Frequently Asked Questions Chapter 9 Using Squid on Solaris Introduction The Default Settings of a Squid Installation Configuring Squid The http_port Tag The cache_dir Tag Access Control Lists Configuring SNMP Configuring the cachemgr.cgi Utility New in Squid 2.4-Help for IE UsersConfiguring Access to Squid Services The Basics of Basic-Auth Access Control for Users Access Control Lifetime Configuring Proxy Clients Excluding Access to Restricted Web Sites Filtering Content by URL Filtering by Destination Domain Filtering by MIME Type Filtering by Content-Length Header Summary Solutions Fast Track Frequently Asked QuestionsChapter 10 Dissecting Hacks Introduction Securing against Denial of Service Hacks Ping of Death Syn Flood E-Mail Flood Securing against Buffer Overflow Hacks Buffer Overflow against a Web Server Buffer Overflow against an FTP Server Securing against Brute Force Hacks Defending against Password Crackers Securing against Trojan Horse Hacks Defending against Rootkits Defusing Logic Bombs Defending against PATH and Command SubstitutionSecuring against IP Spoofing Securing Your .rhosts File MAC Address SpoofingSummary Solutions Fast Track Frequently Asked Questions Chapter 11 Detecting and Denying Hacks Introduction Monitoring for Hacker Activity Using Tripwire Using Shell Scripts to Alert Systems Administrators Monitoring Running Processes Monitoring CPU Activity Putting It All Together What to Do Once You've Detected a Hack What's a HoneypotMonitoring Solaris Log Files Solaris Log Files to Review Creating Daily Reports A State-of-the-System Report Summary Solutions Fast Track Frequently Asked Questions Hack Proofing Sun Solaris 8 Fast Track Index 381