Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bauer M.D. — Building Secure Servers With Linux
Bauer M.D. — Building Secure Servers With Linux



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Secure Servers With Linux

Автор: Bauer M.D.

Аннотация:

Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured — some of which rival expensive commercial equivalents — making Linux a particularly appropriate platform for providing secure Internet services.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 448

Добавлена в каталог: 05.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
SAINT      
Salt      
Samba      
sample policy file      
SASL (simple authentication and security layer)      2nd
sasldb, SASL method      
scan types      
Scanners      
Scanning      
scanning for signatures versus anomalies      
scanning tools      
scans      
schain_hostnames, syslog-ng global option      
Scheidler, Balazs      
Schneier, Bruce      2nd 3rd
SCP      2nd
scp, and      
scp, SSH tool      2nd 3rd
screate_dirs, syslog-ng global option      
screened-subnet architecture      
script example      
script for a multihomed firewall system      
script for running FTP & HTTP services
Script kiddies      2nd
sdir_group, syslog-ng global option      
sdir_owner, syslog-ng global option      
sdir_perm, syslog-ng global option      
secrets file, rsync option      
Secure      
secure FTP      [See SFTP]
secure installation      
secure service, example      
Secure Shell      [See SSH]
Secure Shell Daemon      [See sshd]
Secure Sockets Layer      [See SSL]
SecureInetd.pm, InteractiveBastille module      
securing      
securing Internet      
securing scripts      
securing services      
Security      
security advisories      
security in depth      
security logging categories      
security principles      
security scans      2nd
security updates      
security updates, and      
security-advisory email lists      
security-announcement mailing lists      
selecting which type      
sendmail      
Sendmail preparation      
Sendmail version support      
Sendmail, and      
sendmail.cf file      2nd 3rd
sendmail.mc file      
Sendmail.pm, InteractiveBastille module      
serious security problems in      
server      
server packages      
server setup      
server, central      
server-server      
server-server authentication, for      
server-server relaying      
server-server SMTP relays      
Server-Side Includes (SSI)      
ServerIdent, ProFTPD setting      
ServerName, ProFTPD setting      
ServerRoot, Apache option      
Servers      
ServerType, ProFTPD setting      
Services      
services on      
services on firewall      
services, securing      
session      2nd
session keys      2nd
Sessions      
sessions and cookies      
sessions and cookies explained      
set group-ID (SGID)      
set user-ID (SUID)      
setting up and using      
Setup      
SFTP      
sftp, SSH tool      2nd
SGID (set group-ID)      
sgroup, syslog-ng global option      
Shamir, Adi      
Shapiro, Gregory Neil      
shosts authentication      
Sidewinder      
Signature      
signature-based systems      
signatures      2nd
signatures, for      2nd
SIMPLE      
Simple Authentication and Security Layer      [See SASL]
Simple Mail Transfer Protocol      [See SMTP]
Simple Object Access Protocol (SOAP)      
simple packet filter      
simple packet filtering      
simple port scans      
simplefile, read-only HTTP and FTP server      
single-port TCP service      
site maintenance      
site management      
skeep_hostnames, syslog-ng global option      
SMB (CIFS)      [See Samba]
SMTP (Simple Mail Transfer Protocol)      
SMTP AUTH      2nd
SMTP AUTH, and      
SMTP relays      
SMTP targeted      
SMTP, and      
Snort      
snort.conf file      
SOAP (simple object access protocol)      
SOCKS protocol      
software-development environments      
Song, Dug      
Source      
sowner, syslog-ng global option      
Spafford, Gene      2nd
SpamAssassin      
spamming      
specifying where to keep certificates      
sperm, syslog-ng global option      
spiders and robots      
Spitzner, Lance      2nd
split DNS      2nd
split services      2nd
spoofed packets      
Spoofing      2nd 3rd 4th 5th
SSH      
SSH (Secure Shell)      [See also OpenSSH]2nd 3rd
SSH Communications Security      
SSH transactions, and      
SSH, and      
ssh, SSH tool      
ssh-add      2nd
ssh-add, SSH tool      2nd
ssh-agent      2nd
ssh-agent, SSH tool      2nd
ssh-askpass      
ssh-askpass, SSH tool      
ssh-keygen      
ssh-keygen, SSH tool      2nd
sshd      
sshd (Secure Shell Daemon)      
sshd_config file      2nd 3rd 4th
sshd_config parameter      
ssh_config file      2nd 3rd
ssh_config parameter      
SSI (Server-Side Includes)      
SSL      
SSL (Secure Sockets Layer)      [See also OpenSSL]
SSL sessions      
SSL transactions, and      
SSL tunnels      
SSL, and      
SSL-wrapper utility      
SSLeay      
sslog_fifo_size, syslog-ng global option      
SSLwrap      
ssync, syslog-ng global option      
standalone programs      
Start-of-Authority (SOA) record      
starting in      
STARTTLS      
STARTTLS, and      
startup flags      
startup services, managing      
state-based systems      [See anomaly detection systems]
stateful      2nd
stateful inspection      
stateful packet filter      
stateful packet filtering      
static content and Apache      
static content, and      
statically linked versions of      
statically linked versions of Apache      
Stealth      
stealth logging      
stealth logging, and      
stealth scanning      2nd
Stein, Lincoln      
stime_reap, syslog-ng global option      
stime_reopen, syslog-ng global option      
Stoll, Cliff      
Stream ciphers      
strong screened      
strong screened-subnet      
structure and syntax      
stunnel      
Stunnel, and      
SU
Subnets      
Subversion      
sudo      2nd
suEXEC      
SUID (set-user ID)      
supported source drivers      
SUSE      
SuSE, and      
suse-security-announce      
suse-security-announce mailing list      
SuSEOs Proxy Suite      
suse_dns, syslog-ng global option      
suse_fqdn, syslog-ng global option      
suse_times_recvd, syslog-ng global option      
SWATCH      2nd
sweeps      
Symantec Enterprise Firewall      
symmetric algorithm, defined      
synchronization of log files      
Syslog      
syslog, and      
syslog-ng      
syslog-ng, and      
Syslog-ng.conf file      
syslog.conf file      
syslogd      2nd
SyslogFacility, ProFTPD setting      
system      
system availability      2nd
system integrity      
system, overview      
system-integrity checker      
system/network availability      
taint mode, Perl running in      
taint mode, running in      
tarpit      
TCP      2nd
TCP Connect scan      
TCP FIN scan      
TCP handshake      
TCP NULL scan      
TCP port-forwarding      2nd
TCP SYN scan      
TCP Xmas Tree scan      
TCP/IP      
TCP/IP Stack Attack      
tcpclient      
tcpserver      
TCPwrappers      
TCPwrappers, and      
Telnet      2nd
Telnet service example      
termonology      
Testing      
testing and watching logs      
testing SMTP servers      
testing system logging      
Thawte      
threat modeling      
threat models      
threats      2nd
three-homed firewall      
three-homed host      
Three-way handshake      
throttle parameter      
Time To Live interval (TTL)      
timeout, rsync option      
TimeoutIdle, ProFTPD setting      
TimeOutNoTransfer, ProFTPD setting      
TimeOutStalled, ProFTPD setting      
tinydns      2nd
tinydns, djbdns service      2nd
Tipton, Harold      
TLS (Transport Layer Security)      2nd
TLS encryption      
TLS, and      
TMPDIR.pm, InteractiveBastille module      
to run semichrooted      
Tools      [See Swatch]
tools, Free S/WAN      
topologies      
topologies, network      
tracking FTP connections      
Traffic      
traffic analysis      [See IDS NIDS]
Transaction Signatures      [See TSIGs]
transactions, Certificate Authorities, and      
transfer logging, rsync option      
Transport Layer Security      [See TLS]
Trees      
Tridgell, Andrew      
Triple-DES (3DES)      
Tripwire      
Tripwire, and      
TSIGs (Transaction Signatures)      2nd
Tunneling      2nd
tunneling example      
turning on in syslogd      
tux, open source web and FTP server      
tw.cfg file      
Tweedie, Stephen      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте