Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bauer M.D. — Building Secure Servers With Linux
Bauer M.D. — Building Secure Servers With Linux



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Secure Servers With Linux

Автор: Bauer M.D.

Аннотация:

Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured — some of which rival expensive commercial equivalents — making Linux a particularly appropriate platform for providing secure Internet services.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 448

Добавлена в каталог: 05.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
manual application of      
manual updates      
mapping addresses      [See aliases]
mapping email addresses      [See aliases]
mapping of actions to facilities and priorities      
Mark      
mark facility, syslog      
mark, turning on      
MasqueradeAddress, ProFTPD setting      
Masquerading      2nd
master-to-slave updates      
match-clients      
match-clients in view{} statements      
max connections, rsync option      
MaxClients, ProFTPD setting      
MaxClientsPerHost, ProFTPD setting      
MaxInstances, ProFTPD setting      
MDAs (Mail Delivery Agents)      
Mechanisms      
message filters      
message relay access      
message relayed from one host to two others, example      
message sources      
message-forgery      
message-forgery attacks      
METHODS      
Microsoft      
migrating from      
MiscellaneousDaemons.pm, InteractiveBastille module      
mitigation of      
Module      
module [public]Os options      
module-specific options      
Modules      
Molnar, Ingo      
Monitoring      
monitoring files and directories      
motives for      
motives for attacks      
MTAs (Mail Transfer Agents)      
MUAs (Mail User Agents)      
multihomed firewall system      
multihomed firewall system script example      
multihomed host      [See also three-homed host]
Multiple      
multiple facilities      
multiple selectors      
MX records      
MySQL      2nd
NAMED      
named.conf file      
named.conf file example      
named.conf file, in      
named.conf file, using      
ndc, BIND v8Os Name Daemon Control interface      2nd
Nelson, Russell      
Nessus      
nessus, NessusO client component      
nessusd, Nessus daemon      
NetBSD      
Netfilter      2nd
netfilter/iptables      
netstat, using to display TCP/IP listening sockets      
Network      [See NIDS]
network design      
Network Flight Recorder      
network IDS      [See NIDS]
Network monitoring      
Network Solutions      
network-access control devices      
Network-Address-Translated (NAT-ed) server      
NFS      
NIDS (network IDS)      
Nimda      
NimdaNotifyer      
NIS/NIS+      
nmap      
nmapfe, nmap GUI      
nonanonymous      
nonanonymous FTP      
None      
none facility, syslog      
nonliability      
Northcutt, Stephen      
Novak, Judy      
NS records      
null-passphrase keys      
obtaining Cyrus SASL      
obtaining, compiling, and installing      
official (maintained) documentation      
oinkmaster      
open      
open relays and email abuse      
OpenBSD      
OpenBSD, and      
OpenSSH      
OpenSSH, and      
OpenSSL      
OpenSSL home directory      
OpenSSL, and      2nd
openssl.cnf file      
options      
OPTIONS method, HTTP      
options, OS fingerprinting      
options, resource      
options{} section      
options{} section in named.conf file      
OS fingerprinting      
OSSH      
overview      
Ozier, Will      
Package      
package dependencies      
package version checking      
package version checking with RPM      
packet filtering      
packet logger, using as a      
packet sniffer, using as a      
packet sniffers      2nd
packet-filter Rule Specifications      
Packets      
pair      
Pairs      [See also user keys host keys][See also user keys host keys]
PAM (pluggable authentication modules)      2nd
pam, SASL method      
Parameters      
Passphrase      
passphrase-less      
passphrase-less key      
PasswordAuthentication      
Passwords      
passwords, POP3      
patches      
path, rsync option      
peer-to-peer model for      
peer-to-peer model for authentication      
performing security scans with      
perimeter networks      
Perl      
Perl processing      
Perl, and      
perl-Curses      
PermitEmptyPasswords      
PermitEmptyPasswords, sshd_config parameter      
PermitRootLogin      
PermitRootLogin, sshd_config parameter      
persistent      
persistent daemon      
PHP      
PHP processing      
PHP, and      
php.ini file      
Ping      
PK crypto      [See public-key cryptography]
Planning      
Pluggable Authentication Modules      [See PAM]
policy file      
pop      
POP3      
POP3, and      
Port      [See nmap]
port assignments, new      
port scanners      
port scans      
PORT Theft      
PORT Theft attacks      
Port, ProFTPD setting      
Port, sshd_config parameter      
port-forwarding      
portmapper service      2nd
POST      
POST method, HTTP      
Postfix      
Postfix, and      
Postfix, using      
Preparation      
preprocessor plug-ins      
Principle of Least Privilege      
Principles      
principles of      
Printing.pm, InteractiveBastille module      
Priorities      
priorities, syslog      
privacy flags      
PRIVATE      2nd 3rd
Private keys      2nd 3rd
Private-key      
private-key passphrase      
probes      
Problems      
processes, on compromised system      
processing form data      
procmail      
ProFTPD      
ProFTPD example      
ProFTPD run as a      
ProFTPD, and      
ProFTPD, in      
proftpd.conf file      2nd 3rd
project site      
property masks      
pros and cons      
protected      
protocol analyzer      [See packet sniffers]
Protocols      
Provos, Niels      
Proxies      
proxying      
proxying firewalls      
ps auxw, on compromised system      
PUBLIC      
public certificates      
Public keys      2nd
Public services      
public services on a firewall      
Public-key cryptography      2nd 3rd 4th
public-key infrastructures      2nd 3rd
put      
PUT method, HTTP      
pwcheck_method, SASL variable      
Qmail      2nd
Queries      
Queues      
quick start instructions      
quick start procedure      
r-services      
ranges of IP addresses for vulnerabilities      
Ranum, Marcus      2nd 3rd 4th
Raptor      [See Symantec Enterprise Firewall]
RC4      
rcp      
rcp, and      
re-encrypting      
read only, rsync option      
Readers      
Realtime Blackhole List      
Recursion      
recursion, BIND global option      
Red Hat      
Red Hat Network      
Redhat-Watch-list      
Redhat-Watch-list mailing list      
Redundant      
redundant enforcement points      
redundant system or network      
refuse options, rsync option      
register_globals, PHP variable      
Registration      
rejecting packets      
related to logging      
relay access      
relays      
Remote      
Remote Procedure Call      [See RPC]
remote using syslog      
Representational State Transfer (REST)      
Resource allocation      
resource allocation in the DMZ      
resource record      
restricted access      [See access restriction]
rhn_register command      
rhosts and shosts      
rhosts authentication      
Risk      
rlogin, vulnerability of      
rndc (Remote Name Daemon Control interface)      
robots and spiders      
rootkits      
routers      
Rowland, Craig      
RPC (Remote Procedure Call)      
RPC scan      
RPC services      
rpcbind      [See portmapper service]
rpm      
rpm (RPM Package Manager)      
RSA      
RSA Crypto FAQ      
RSA keys, and      
RSA/DSA      2nd
RSA/DSA keys, and      
rsh, vulnerability of      
rsync      
rsync sessions example      
rsync, and      
rsyncd.conf file      
rule set      
Rule Specifications      
Rules      
runaway programs      
Running      
running an older version of      
running and maintaining      
running checks and updates      
running in      
running in daemon mode      
running over SSH      
running services on      2nd
S/KEY      
SAFER      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте