Practical Unix and Internet Security,3rd Editionseeders: 9
leechers: 2
Practical Unix and Internet Security,3rd Edition (Size: 17.26 MB)
Descriptionhttp://www.mynetsafety.com/2014/07/practical-unix-and-internet-security.html BOOK DESCRIPTION When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book – a companion for the Unix/Linux system administrator who needs to secure his or her organization’s system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix variants today–Solaris, Mac OS X, Linux, and FreeBSD–this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today’s threats. TABLE OF CONTENTS Part I - Computer Security Basics Chapter 1. Introduction: Some Fundamental Questions Chapter 2. Unix History and Lineage Chapter 3. Policies and Guidelines Part II - Security Building Blocks Chapter 4. Users, Passwords, and Authentication Chapter 5. Users, Groups, and the Superuser Chapter 6. Filesystems and Security Chapter 7. Cryptography Basics Chapter 8. Physical Security for Servers Chapter 9. Personnel Security Part III - Network and Internet Security Chapter 10. Modems and Dialup Security Chapter 11. TCP/IP Networks Chapter 12. Securing TCP and UDP Services Chapter 13. Sun RPC Chapter 14. Network-Based Authentication Systems Chapter 15. Network Filesystems Chapter 16. Secure Programming Techniques Part IV - Secure Operations Chapter 17. Keeping Up to Date Chapter 18. Backups Chapter 19. Defending Accounts Chapter 20. Integrity Management Chapter 21. Auditing, Logging, and Forensics Part V - Handling Security Incidents Chapter 22. Discovering a Break-in Chapter 23. Protecting Against Programmed Threats Chapter 24. Denial of Service Attacks and Solutions Chapter 25. Computer Crime Chapter 26. Who Do You Trust? Part VI - Appendixes Appendix A. Unix Security Checklist Appendix B. Unix Processes Appendix C. Paper Sources Appendix D. Electronic Resources Appendix E. Organizations Related Torrents
Sharing Widget |