Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bauer M.D. — Building Secure Servers With Linux
Bauer M.D. — Building Secure Servers With Linux



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Secure Servers With Linux

Автор: Bauer M.D.

Аннотация:

Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured — some of which rival expensive commercial equivalents — making Linux a particularly appropriate platform for providing secure Internet services.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 448

Добавлена в каталог: 05.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
directives      
directories      
DisableUserTools.pm, InteractiveBastille module      
disabling      
disadvantages of starting from inetd      
disadvantages of starting ProFTPD from inetd or xinetd      
disadvantages of starting ProFTPD from xinetd      
discussion on      
Distributed Authoring and Versioning      [See WebDAV]
Distributed Denial of Service (DDoS)      
djbdns      
djbdns, and      
DMZ (demilitarized zone)      
DMZ mail servers      [See SMTP gateways]
DMZ networks, and      
DNS      
DNS (Domain Name Service)      
DNS, and      
dnscache      2nd
dnscache, djbdns service      2nd
dnscachex      
dnscachex, djbdns service      
dnskeygen command      
DNSsec      2nd
documenting bastion hostsO configurations      
documenting configurations      
DocumentRoot, Apache option      
Domain Name Service      [See DNS]
dont compress, rsync option      
DOS      [See Denial of Service attacks]
download site      
download sites      
drop-off directory      
dropping packets      
DSA      
DSA keys, and      
Durham, Mark      
dynamic content and Apache      
dynamic content, and      
dynamically linked versions of      
dynamically linked versions of Apache      
EAO (Expected Annual Occurence)      
editing or creating a policy      
electronic crimes      
Email      
email and uucp messages      
email relay access, and      
email, and      
encrypted      
encrypted file transfers      
encrypted file transfers, and      
enhancing      
entropy, defined      
entry types      
environment variable access control in Apache      
environment-variable      
example      
examples of use      
Exchange      
executing programs      
Exim      2nd
Expected Annual Occurrence (EAO)      
explained      
EXPN      
EXPN, SMTP command      
EXTERNAL      
external cache      
external DNS      
external DNS server example      
facilities      
facilities, syslog      
FAQ      
FastCGI      
Fcheck      
Feature      2nd
Fennelly, Carole      
fetch-glue, BIND global option      
file hierarchy, securing      
file locations      
file management      
file services      
file sharing, and      
file synchronization      
file synchronization, and      
File Transfer Protocol      [See FTP]
file transfers      2nd
FilePermissions.pm, InteractiveBastille module      
Files      
Fine-tuning      
Firebox      
firewall architecture      
firewall, setting up      
Firewall.pm, InteractiveBastille module      
Firewalls      2nd
firewalls, and      
Flags      
form checking with JavaScript      
form data      
form-based file uploads      
Forrester, Ron      2nd
ForwardX11      
ForwardX11, ssh_config parameter      
free      [See Tripwire Snort]
free download      
Free S/WAN      
FreeBSD      
frequently targeted      
Friedl, Jeffrey E. F.      
Friedl, Markus      
FrontPage Server Extensions      
FTP      
ftp (file transfer protocol)      2nd
FTP Bounce      
FTP commands that can be limited      
Garfinkel, Simson      
gateways      [See SMTP gateways]
generating and signing      
Generic Service Proxy      [See GSP]
get      
GET method, HTTP      
Getting      
getting and installing      
getting, compiling, and installing      
gid, rsync option      
GIMP      
global data security issue      
Global options      
global settings      2nd
global versus per-package updates      
gmp, scripting environment      
goals      
goals and problems      
good methods for      
Gr?nvall, Bj?rn      
Group, Apache option      
GSP (Generic Service Proxy)      2nd
gtk, GIMP Tool Kit      
GUI tools      
Hansen, Stephen      
hardened system, defined      
hardening a system      
hardening the OS      
hash, database format      
hashes      
Hazel, Philip      
head      
HEAD method, HTTP      
helper applications      
helper-application syntax versus tinydns-data syntax      
heterogeneous environments      
heterogeneous firewall environments      
hiding internal email addresses      
hijacked      
hijacked daemon      
HINFO records      
history of      
home directories      
honey (decoy) nets      
Honeynet Project, information on attackers      
Host      2nd
host keys      2nd
host-based      
host-based access control in Apache      
host-based IDSes      
hosts allow, rsync option      
hosts deny, rsync option      
how it works      
how secure connections are built      
how SSL clients, servers, and CAs use      
Hrycaj, Jordan      
HTML, active content tags      
htmlentities, PHP function      
htmlspecialcharacters, PHP function      
HTTP      
HTTP, and      
httpd.conf file      2nd
Hunt, Craig      
Hybris worm      
IDEA      2nd
IDS (Intrusion Detection Systems)      
IDS mode      
IDS, configuring and using Snort as an      
ignore nonreadable, rsync option      
IIS (Microsoft Internet Information Server), critical security problems      
IMAP clients as email readers      
important features      
in DNS      
in.talkd, Inetd-style daemon      
in.telnetd, Inetd-style daemon      
including files      
inetd      
Inetd mode      
inetd, and      
installation methods      
Installing      
installing and running      
installing in a nonstandard directory-tree      
installing/running only necessary software      
integrity checkers      2nd
integrity checking, defined      
integrity of      
InteractiveBastille      
Internal      
internal cache      
internal DNS      
internal network, defined      
Internet Daemon      [See inetd]
Internet Information Server      [See IIS]
Internet Scanner      
intrusion detection systems      [See IDS]
intrusion detection techniques      
invoking      
IP aliases, creating      
IP-spoofing      [See spoofing]
ipchains      2nd 3rd
iptables      2nd
iptables kernel      
iptables script for running FTP & HTTP services
iptables, and      
iptables, using for local security      
ip_conntrack_ftp, iptables kernel module      
ISS RealSecure      
Jaenicke, Lutz      
Kaseguma, Rick      2nd
keeping software up-to-date      
KerberosIV      2nd
kerberos_v4, SASL method      
Kern      
kern facility, syslog      
kernel log daemon      
key length      
key length, RSA/DSA keys      
Keys      
Kilger, Max      
Kim, Gene      
Klaus, Christopher      
klogd (LinuxOs kernel log daemon)      2nd
Krause, Micki      
LAMP platform      
Languages      
Lasser, Jon      
Lechnyr, David      
libgmp      [See gmp]
libol (support library)      
libol, syslog-ng support library      
libpcap      
libpcap bug affecting Nessus port scans      
libpcap, network packet capture tool      
Linking      
Linux Intrusion Detection System (LIDS)      
linuxconfd, system administration tool      
Listen, Apache option      
listen-on, BIND global option      
listening hosts      [See NIDS probes]
listening ports      
listening sockets, displaying      
Liu, Cricket      
load balancers      
local-host-names      
local7      
local7 facility, syslog      
LOG      
log directories      
log files      
log management and monitoring      
log monitoring tools      [See Swatch]
log-rotation scheme      
LogFormat, ProFTPD setting      
logger, command-line application      
logging      
logging and controlling access      
logging messages      
Logging.pm, InteractiveBastille module      
logging{} section      
logging{} section in named.conf file      
logrotate      
logrotate.conf file      
logs      
log{} statements      
look-ups      
Lotus Notes      
Lubanovic, Bill      
Lugo, Dave      
m4 scripts      
m4 variable definitions, Sendmail      
Mackerras, Paul      
Mail Delivery Agents (MDAs)      
Mail messages      
Mail Transfer Agents      [See MTAs]
Mail User Agents (MUAs)      
mail, logging messages      
mail-transfer protocols      
Mailer      
MAILER( ) directive      
mailertable file      
mailertable sample      
mailing lists      2nd
MAILNOVIOLATIONS, Tripwire setting      
makemap command      
Management      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте