買這商品的人也買了...
-
$580$458 -
$880$695 -
$650$553 -
$590$466 -
$550$435 -
$1,330Linux Security Cookbook (Paperback)
-
$750$638 -
$560$476 -
$850$723 -
$750$593 -
$780$663 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$640$608 -
$650$553 -
$650$507 -
$450$383 -
$680$578 -
$1,250$1,225 -
$790$672 -
$1,860$1,767 -
$760GDB Pocket Reference (Paperback)
-
$650$507 -
$400$360 -
$780$741 -
$400$340
相關主題
商品描述
Description:
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.
Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.
A number of new security topics have been added for this edition, including:
- Database security, with a focus on MySQL
- Using OpenLDAP for authentication
- An introduction to email encryption
- The Cyrus IMAP service, a popular mail delivery agent
- The vsftpd FTP server
Geared toward Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Linux Server Security with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.
Table of Contents:
Preface
1. Threat Modeling and Risk Management
Components of Risk
Simple Risk Analysis: ALEs
An Alternative: Attack Trees
Defenses
Conclusion
Resources
2. Designing Perimeter Networks
Some Terminology
Types of Firewall and DMZ Architectures
Deciding What Should Reside on the DMZ
Allocating Resources in the DMZ
The Firewall
3. Hardening Linux and Using iptables
OS Hardening Principles
Automated Hardening with Bastille Linux
4. Secure Remote Administration
Why It's Time to Retire Cleartext Admin Tools
Secure Shell Background and Basic Use
Intermediate and Advanced SSH
5. OpenSSL and Stunnel
Stunnel and OpenSSL: Concepts
6. Securing Domain Name Services (DNS)
DNS Basics
DNS Security Principles
Selecting a DNS Software Package
Securing BIND
djbdns
Resources
7. Using LDAP for Authentication
LDAP Basics
Setting Up the Server
LDAP Database Management
Conclusions
Resources
8. Database Security
Types of Security Problems
Server Location
Server Installation
Database Operation
Resources
9. Securing Internet Email
Background: MTA and SMTP Security
Using SMTP Commands to Troubleshoot and Test SMTP Servers
Securing Your MTA
Sendmail
Postfix
Mail Delivery Agents
A Brief Introduction to Email Encryption
Resources
10. Securing Web Servers
Web Security
The Web Server
Web Content
Web Applications
Layers of Defense
Resources
11. Securing File Services
FTP Security
Other File-Sharing Methods
Resources
12. System Log Management and Monitoring
syslog
Syslog-ng
Testing System Logging with logger
Managing System Logfiles with logrotate
Using Swatch for Automated Log Monitoring
Some Simple Log-Reporting Tools
Resources
13. Simple Intrusion Detection Techniques
Principles of Intrusion Detection Systems
Using Tripwire
Other Integrity Checkers
Snort
Resources
Appendix:. Two Complete iptables Startup Scripts
Index