Demonstrates exactly how to protect your vital resources, using today's most powerful Open Source security tools. Helps make you an expert quickly, with insiders' coverage of the potential problems and rules of thumb, and undocumented tricks you'd otherwise have to learn the hard way.
"synopsis" may belong to another edition of this title.
The introduction of Linux System Security acknowledges that there's no magic bullet as far as security is concerned. Security-minded system administration is a process of constant revision. It promises, though, that "[i]f you follow the procedures outlined in this book, you will certainly reduce your level of vulnerability." The book delivers on that promise in spades.
Using Red Hat Linux as the demonstration environment, the authors explain how to use a suite of publicly available tools to analyze, protect, and monitor your machines and networks. They approach the subject from a practical standpoint, emphasizing software and its use while referring the reader (using copious bibliographic notes) to more specialized works for detailed information on cryptography, firewall configuration, and other subjects.
Scott Mann and Ellen Mitchell have done excellent work in combining explanations of the "soft" aspects of security management with the particulars of using software. In a typical section, they explain how to acquire, install, and run Crack, a password breaker. First they show how a bad guy would use Crack to get unauthorized access to a machine over a network; then they explore the "white hat" applications of the program as a security tool for preemptively weeding out weak passwords. More detailed coverage goes to tiger and Tripwire, a pair of powerful auditing and monitoring tools. Along with Maximum Linux Security (which covers more offensive and defensive weapons in less detail), this is one of the two best Linux security books you can own. --David Wall
Topics covered: Linux security practices and tools, as demonstrated under Red Hat Linux 5.2 and 6. Software and commands include Pluggable Authentication Modules (PAM), OPIE, syslog, sudo, xinetd, Secure Shell (SSH), Crack, tiger, Tripwire, The Cryptographic File System (TCFS), and ipchains. The authors discuss administrative policies and procedures along the way.From the Back Cover:
Maximize Linux security, hands-on-with today's best open source tools
If you depend on Linux to run mission-critical networks or store business-critical data, are you sure you can protect your Linux systems from intruders? You'd better be-and with Linux System Security, you can be!
Long-time Linux sysadmins Scott Mann and Ellen Mitchell demonstrate exactly how to protect your vital resources, using today's most powerful open source security tools. Linux System Security makes you an expert fast, with insiders' coverage of the "gotchas," "rules of thumb," and undocumented tricks you'd otherwise have to learn the hard way. Coverage includes:
* Preparing Linux systems for a production environment
* Identifying vulnerabilities, and planning for security administration
* Configuring Linux-based firewalls, authentication, and encryption
* Intrusion detection on Linux systems
* Securing filesystems, email, web servers, and other key applications
* Protecting mixed Linux/Unix and Windows NT environments
You'll find hands-on introductions to the Linux community's most important security tools, including sudo, TCP, wrappers, xinetd, SSH, tiger, Tripwire, ipchains, PAM, crack, and many others.
If you want the benefits of Linux without the security risks, you want Linux System Security!
"About this title" may belong to another edition of this title.
Book Description Prentice Hall. Textbook Binding. Book Condition: Good. Book shows minor use. Cover and Binding have minimal wear, and the pages have only minimal creases. Bookseller Inventory # G0130158070I3N00
Book Description Prentice Hall. Textbook Binding. Book Condition: As New. Straight spine with no creases. Cover has no damage and pages show little wear. Bookseller Inventory # G0130158070I2N00
Book Description Prentice Hall. Textbook Binding. Book Condition: Very Good. Nice condition with minor indications of previous handling. Bookseller Inventory # G0130158070I4N00
Book Description Prentice Hall. Textbook Binding. Book Condition: VERY GOOD. little to no wear, pages are clean. The cover and binding are crisp with next no creases. Bookseller Inventory # 2755874808
Book Description Prentice Hall PTR, 1999. Hardcover. Book Condition: Good. Possible defects such as light shelving wear may exist. May have minor creasing, writing, stickers and/or residue. COAS Books, A Bookstore for Everyone. Ships Within 24 Hours - Satisfaction Guaranteed!. Bookseller Inventory # mon0000503315
Book Description Prentice Hall, 1999. Textbook Binding. Book Condition: Used: Very Good. Bookseller Inventory # SONG0130158070
Book Description Prentice Hall. TEXTBOOK BINDING. Book Condition: Fine. 0130158070 New Condition. Crisp pages and tight binding. Appears unread. Bookseller Inventory # XBB-7SC6-G166
Book Description Paperback. Book Condition: Good. Used book in GOOD condition. Good enough to read. Binding in GOOD shape with no missing pages. Cover has visible wear. Markings, writings and highligtings inside the book. Text ONLY. Does NOT include accessories such as CD, DVD, access code etc. Fast Shipping. Prompt Customer Service. Satisfaction guaranteed. Bookseller Inventory # 0130158070GOA
Book Description Hardback. Book Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Bookseller Inventory # GOR002599542
Book Description Book Condition: Very Good. Book Condition: Very Good. Bookseller Inventory # 97801301580793.0