Linux security cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you w...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Beijing ; Sebastopol, California :
O'Reilly
[2003]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627257406719 |
Tabla de Contenidos:
- Table of Contents; Preface; A Cookbook About Security?!?; Intended Audience; Roadmap of the Book; Our Security Philosophy; Supported Linux Distributions; Trying the Recipes; Conventions Used in This Book; We'd Like to Hear from You; Acknowledgments; System Snapshots with Tripwire; 1.0 Introduction; 1.1 Setting Up Tripwire; Problem; Solution; Discussion; See Also; 1.2 Displaying the Policy and Configuration; Problem; Solution; Discussion; See Also; 1.3 Modifying the Policy and Configuration; Problem; Solution; Discussion; See Also; 1.4 Basic Integrity Checking; Problem; Solution; Discussion
- See Also1.5 Read-Only Integrity Checking; Problem; Solution; Discussion; See Also; 1.6 Remote Integrity Checking; Problem; Solution; Discussion; See Also; 1.7 Ultra-Paranoid Integrity Checking; Problem; Solution; Discussion; See Also; 1.8 Expensive, Ultra-Paranoid Security Checking; Problem; Solution; Discussion; 1.9 Automated Integrity Checking; Problem; Solution; Discussion; See Also; 1.10 Printing the Latest Tripwire Report; Problem; Solution; Discussion; See Also; 1.11 Updating the Database; Problem; Solution; Discussion; See Also; 1.12 Adding Files to the Database; Problem; Solution
- DiscussionSee Also; 1.13 Excluding Files from the Database; Problem; Solution; Discussion; See Also; 1.14 Checking Windows VFAT Filesystems; Problem; Solution; Discussion; See Also; 1.15 Verifying RPM-Installed Files; Problem; Solution; Discussion; See Also; 1.16 Integrity Checking with rsync; Problem; Solution; Discussion; See Also; 1.17 Integrity Checking Manually; Problem; Solution; Discussion; See Also; Firewalls with iptables and ipchains; 2.0 Introduction; 2.1 Enabling Source Address Verification; Problem; Solution; Discussion; See Also; 2.2 Blocking Spoofed Addresses; Problem; Solution
- DiscussionSee Also; 2.3 Blocking All Network Traffic; Problem; Solution; Discussion; See Also; 2.4 Blocking Incoming Traffic; Problem; Solution; Discussion; See Also; 2.5 Blocking Outgoing Traffic; Problem; Solution; Discussion; See Also; 2.6 Blocking Incoming Service Requests; Problem; Solution; Discussion; See Also; 2.7 Blocking Access from a Remote Host; Problem; Solution; Discussion; See Also; 2.8 Blocking Access to a Remote Host; Problem; Solution; Discussion; See Also; 2.9 Blocking Outgoing Access to All Web Servers on a Network; Problem; Solution; Discussion; See Also
- 2.10 Blocking Remote Access, but Permitting LocalProblem; Solution; Discussion; See Also; 2.11 Controlling Access by MAC Address; Problem; Solution; Discussion; See Also; 2.12 Permitting SSH Access Only; Problem; Solution; Discussion; See Also; 2.13 Prohibiting Outgoing Telnet Connections; Problem; Solution; Discussion; See Also; 2.14 Protecting a Dedicated Server; Problem; Solution; Discussion; See Also; 2.15 Preventing pings; Problem; Solution; Discussion; See Also; 2.16 Listing Your Firewall Rules; Problem; Solution; Discussion; See Also; 2.17 Deleting Firewall Rules; Problem; Solution
- Discussion