Linux security (Record no. 11644)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06990nam a2200217 a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 078212741X |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780782127416 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 8176564575 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9788176564571 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.43 |
Item number | HON |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Hontanol, Ramon J. ; |
245 ## - TITLE STATEMENT | |
Title | Linux security |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | New Delhi : |
Name of publisher | BPB Publications, |
Year of publication | ©2001. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxvii, 482 p. : |
500 ## - GENERAL NOTE | |
General note | Included Index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part 1 System Security 1 --<br/>Chapter 1 Understanding Linux Security 3 --<br/>An Information Security Primer 4 --<br/>Process of Information Security 8 --<br/>Goals of Information Security 13 --<br/>Data Confidentiality 13 --<br/>Data Integrity 14 --<br/>User Authentication and Access Control 15 --<br/>Data and Service Availability 16 --<br/>Linux Security 17 --<br/>Types of Attackers 17 --<br/>Common Attacks against Linux Servers 18 --<br/>Layered Approach to Information Security 25 --<br/>Physical Security 26 --<br/>System Security 27 --<br/>Network Security 27 --<br/>Application Security 27 --<br/>Perimeter Security 27 --<br/>Remote Access and Authentication 28 --<br/>Human Security 28 --<br/>Chapter 2 System Installation and Setup 31 --<br/>Choosing a Linux Distribution 32 --<br/>Red Hat 33 --<br/>Caldera 33 --<br/>SuSE 34 --<br/>Turbolinux 35 --<br/>Debian 36 --<br/>And the Winner Is ... 37 --<br/>Building a Secure Kernel 38 --<br/>User Account Security 41 --<br/>Good Passwords 44 --<br/>Shadow Passwords 45 --<br/>Sudo Utility 47 --<br/>File and Directory Permissions 50 --<br/>suid and sgid 51 --<br/>Umask setting 53 --<br/>Limiting Core Dump Size 54 --<br/>syslog Security 55 --<br/>Filesystem Encryption 55 --<br/>Cryptographic File System 56 --<br/>Practical Privacy Disk Driver 58 --<br/>Chapter 3 System Monitoring and Auditing 63 --<br/>System Logging with syslog 64 --<br/>syslog.conf File 65 --<br/>syslog Server Security 68 --<br/>System Log Monitoring 68 --<br/>swatch 68 --<br/>logcheck 73 --<br/>swatch vs. logcheck 78 --<br/>File Integrity Auditing 78 --<br/>tripwire 79 --<br/>Password Auditing 87 --<br/>John the Ripper 88 --<br/>Part 2 Network Security 93 --<br/>Chapter 4 Network Services Configuration 95 --<br/>Securing Network Services 96 --<br/>Spawning Internet Daemons with inetd 96 --<br/>Configuring inetd with /etc/inetd.conf 97 --<br/>inetd Configuration Examples 99 --<br/>xinetd: The Next Generation inetd 100 --<br/>Installing xinetd 100 --<br/>Configuring xineted with /etc/xinetd.conf 100 --<br/>xinetd Configuration Examples 103 --<br/>Starting Network Services from /etc/rc.d 105 --<br/>Additional Network Security Considerations 111 --<br/>Disabling rhosts authentication 111 --<br/>Portmap Daemon and RPC Services 111 --<br/>Running Network Services as chroot 112 --<br/>TCP Wrappers 113 --<br/>Installing TCP Wrappers 113 --<br/>Configuring TCP Wrappers 114 --<br/>TCP Wrapper Configuration Examples 116 --<br/>Testing Your TCP Wrappers Configuration 117 --<br/>TCP Wrappers Event Logging 119 --<br/>/Etc/services File 120 --<br/>Netstat Command 121 --<br/>Chapter 5 Network Auditing and Monitoring 125 --<br/>Network Auditing 125 --<br/>Network-Based Auditing Tools 126 --<br/>Host-Based Auditing Tools 143 --<br/>TARA 144 --<br/>Network Monitoring 148 --<br/>PortSentry 149 --<br/>Ethereal 152 --<br/>Part 3 Application Security 155 --<br/>Chapter 6 Electronic Mail 157 --<br/>Sendmail 158 --<br/>Secure Mail Relaying via SMTP Authentication 158 --<br/>SMTP over TLS 160 --<br/>Using STARTTLS 163 --<br/>Qmail 164 --<br/>Postfix 166 --<br/>Post Office Protocol (POP) V.3 167 --<br/>APOP 167 --<br/>Installing the Qpopper Software 169 --<br/>Configuring the Qpopper Software 169 --<br/>Using the Qpopper Software 171 --<br/>IMAP 171 --<br/>Installing the IMAP Server Software 172 --<br/>Configuring the Secure IMAP Server 172 --<br/>Using the Secure IMAP Server 174 --<br/>PGP and GnuPG 177 --<br/>Installing GnuPG 178 --<br/>Configuring GnuPG 178 --<br/>Using GnuPG 180 --<br/>Chapter 7 HTTP Services 185 --<br/>Apache HTTP Server 186 --<br/>Configuring Apache Security 187 --<br/>Hardening the Apache Server 202 --<br/>Application Logs 204 --<br/>mod_ssl 205 --<br/>Installing mod_ssl 206 --<br/>Configuring mod_ssl 207 --<br/>Apache-SSL 215 --<br/>Chapter 8 Samba Security 219 --<br/>Samba Server 220 --<br/>Installing Samba 223 --<br/>Samba Administration with SWAT 224 --<br/>Securing Samba 227 --<br/>Using Samba as a Windows NT Primary Domain Controller 240 --<br/>Part 4 Perimeter Security 245 --<br/>Chapter 9 Network Layer Firewalls 247 --<br/>Firewalls: An Overview 247 --<br/>Linux as a Firewall Platform 249 --<br/>Packet Filtering 251 --<br/>Legacy: ipfwadm and ipchains 251 --<br/>Using ipchains 252 --<br/>Ipchains Examples 255 --<br/>Present: Netfilter 257 --<br/>Configuring Netfilter 258 --<br/>iptables 259 --<br/>Sample Firewall Scenarios 268 --<br/>Single-Homed Dial-up Server 268 --<br/>Dual-Homed Firewall: Public and Private Addresses 269 --<br/>Triple-Homed Firewall with a Demilitarized Zone 272 --<br/>Protecting against Well-Known Attacks 275 --<br/>Network Address Translation 277 --<br/>Configuring NAT Using iptables 278 --<br/>Chapter 10 Transport Layer Firewalls 281 --<br/>Proxy Servers 282 --<br/>SOCKS Protocol 283 --<br/>SOCKS4 vs. SOCKS5 283 --<br/>Do You Need SOCKS? 284 --<br/>NEC SOCKS5 Proxy Server 284 --<br/>Installing SOCKS5 with RPM 285 --<br/>Compiling the Latest SOCKS5 Release 286 --<br/>Configuring the SOCKS5 Server 296 --<br/>SOCKS5 Password File 305 --<br/>Starting and Stopping the SOCKS5 Server 306 --<br/>Runsocks Script 309 --<br/>SOCKS5 Shared Library Configuration 310 --<br/>Configuring Windows SOCKS5 Clients 311 --<br/>SOCKS5 IPv4-to-IPv6 Translator 314 --<br/>Chapter 11 Application Layer Firewalls 317 --<br/>FWTK: The TIS Firewall Toolkit 318 --<br/>Installing the FWTK Firewall Toolkit 319 --<br/>FWTK Architectures 324 --<br/>Configuring the FWTK Firewall Toolkit 326 --<br/>NetACL Rules 327 --<br/>Gateway Rules 328 --<br/>Using Strong Authentication with FWTK 338 --<br/>authsrv 338 --<br/>Part 5 Remote Access and Authentnication 345 --<br/>Chapter 12 Virtual Private Networking 347 --<br/>A VPN Primer 348 --<br/>IP Security Protocol (IPsec) 350 --<br/>IP Authentication Header 351 --<br/>IP Encapsulating Security Payload (ESP) 352 --<br/>FreeS/WAN 354 --<br/>Obtaining FreeS/WAN 355 --<br/>Installing FreeS/WAN 357 --<br/>Configuring FreeS/WAN 358 --<br/>Editing the ipsec.secrets File 359 --<br/>Editing the ipsec.conf File 363 --<br/>Testing the Configuration 367 --<br/>Point-to-Point Tunneling Protocol (PPTP) 367 --<br/>PopTop 369 --<br/>Downloading PopTop 369 --<br/>Configuring PopTop 370 --<br/>Running PopTop 371 --<br/>Secure Shell (SSH) 373 --<br/>How SSH Works 374 --<br/>OpenSSH 374 --<br/>Chapter 13 Strong User Authentication 387 --<br/>Kerberos 388 --<br/>Configuring the Kerberos Domain Controller (KDC) 391 --<br/>Managing Kerberos Credentials 406 --<br/>Using Kerberos-Enabled Applications 409 --<br/>S/Key and OPIE 415 --<br/>Installing OPIE 416 --<br/>Configuring OPIE 416 --<br/>Using OPIE 418 --<br/>Pluggable Authentication Modules (PAMs) 420 --<br/>Installing PAM 422 --<br/>Configuring PAM 422 --<br/>PAM Examples 423 --<br/>Appendix B PAM Module Reference 435 --<br/>Pam_access Module 437 --<br/>Pam_cracklib Module 438 --<br/>Pam_deny Module 441 --<br/>Pam_group Module 442 --<br/>Pam_limits Module 443 --<br/>Pam_pwdb Module 445 --<br/>Pam_rootok Module 447 --<br/>Pam_securetty Module 447 --<br/>Pam_unix Module 448. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Linux. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Linux (Computer file) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference Books |
Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Reference | Main Library | Main Library | Reference | 26/01/2004 | Purchased | 562.50 | 005.43 HON | 008272 | Reference Books |