Linux security cookbook

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you w...

Descripción completa

Detalles Bibliográficos
Autor principal: Barrett, Daniel J. (-)
Otros Autores: Byrnes, Robert G., Silverman, Richard E.
Formato: Libro electrónico
Idioma:Inglés
Publicado: Beijing ; Sebastopol, California : O'Reilly [2003]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627257406719
Tabla de Contenidos:
  • Table of Contents; Preface; A Cookbook About Security?!?; Intended Audience; Roadmap of the Book; Our Security Philosophy; Supported Linux Distributions; Trying the Recipes; Conventions Used in This Book; We'd Like to Hear from You; Acknowledgments; System Snapshots with Tripwire; 1.0 Introduction; 1.1 Setting Up Tripwire; Problem; Solution; Discussion; See Also; 1.2 Displaying the Policy and Configuration; Problem; Solution; Discussion; See Also; 1.3 Modifying the Policy and Configuration; Problem; Solution; Discussion; See Also; 1.4 Basic Integrity Checking; Problem; Solution; Discussion
  • See Also1.5 Read-Only Integrity Checking; Problem; Solution; Discussion; See Also; 1.6 Remote Integrity Checking; Problem; Solution; Discussion; See Also; 1.7 Ultra-Paranoid Integrity Checking; Problem; Solution; Discussion; See Also; 1.8 Expensive, Ultra-Paranoid Security Checking; Problem; Solution; Discussion; 1.9 Automated Integrity Checking; Problem; Solution; Discussion; See Also; 1.10 Printing the Latest Tripwire Report; Problem; Solution; Discussion; See Also; 1.11 Updating the Database; Problem; Solution; Discussion; See Also; 1.12 Adding Files to the Database; Problem; Solution
  • DiscussionSee Also; 1.13 Excluding Files from the Database; Problem; Solution; Discussion; See Also; 1.14 Checking Windows VFAT Filesystems; Problem; Solution; Discussion; See Also; 1.15 Verifying RPM-Installed Files; Problem; Solution; Discussion; See Also; 1.16 Integrity Checking with rsync; Problem; Solution; Discussion; See Also; 1.17 Integrity Checking Manually; Problem; Solution; Discussion; See Also; Firewalls with iptables and ipchains; 2.0 Introduction; 2.1 Enabling Source Address Verification; Problem; Solution; Discussion; See Also; 2.2 Blocking Spoofed Addresses; Problem; Solution
  • DiscussionSee Also; 2.3 Blocking All Network Traffic; Problem; Solution; Discussion; See Also; 2.4 Blocking Incoming Traffic; Problem; Solution; Discussion; See Also; 2.5 Blocking Outgoing Traffic; Problem; Solution; Discussion; See Also; 2.6 Blocking Incoming Service Requests; Problem; Solution; Discussion; See Also; 2.7 Blocking Access from a Remote Host; Problem; Solution; Discussion; See Also; 2.8 Blocking Access to a Remote Host; Problem; Solution; Discussion; See Also; 2.9 Blocking Outgoing Access to All Web Servers on a Network; Problem; Solution; Discussion; See Also
  • 2.10 Blocking Remote Access, but Permitting LocalProblem; Solution; Discussion; See Also; 2.11 Controlling Access by MAC Address; Problem; Solution; Discussion; See Also; 2.12 Permitting SSH Access Only; Problem; Solution; Discussion; See Also; 2.13 Prohibiting Outgoing Telnet Connections; Problem; Solution; Discussion; See Also; 2.14 Protecting a Dedicated Server; Problem; Solution; Discussion; See Also; 2.15 Preventing pings; Problem; Solution; Discussion; See Also; 2.16 Listing Your Firewall Rules; Problem; Solution; Discussion; See Also; 2.17 Deleting Firewall Rules; Problem; Solution
  • Discussion