Here's a detailed technical overview of the security mechanisms used in commercial UNIX systems designed to help readers ensure that their UNIX system is correctly configured and operating in the most secure manner possible. Coverage provides all the details for security related functions within common UNIX versions, including information on the configuration and operation of network security services; file system and process security; monitoring security; security programming and standards; security mailing lists; and a wide range of system specific security enhancements. System programmers as well as network and system administrators, and security managers will find this an informative, practical reference.
This book provides a detailed analysis of UNIX security facilities. Designed for system administrators and security managers, this guide covers TCP/IP, UUCP, and OSI networks and their security; progresses from file system security to account security to process security to network security; describes relevant system and library calls, and indicates how they may be used to interface with the security sub-system in the kernel; special chapter included on Trusted Systems; provides detailed descriptions of the various standards applied to UNIX security; provides information on UNIX viruses and Trojan Horses, and their prevention and detection; and also includes an Appendix on the Internet Worm.