Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bauer M.D. — Building Secure Servers With Linux
Bauer M.D. — Building Secure Servers With Linux



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Secure Servers With Linux

Автор: Bauer M.D.

Аннотация:

Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured — some of which rival expensive commercial equivalents — making Linux a particularly appropriate platform for providing secure Internet services.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 448

Добавлена в каталог: 05.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Types      2nd
UCE (Unsolicited Commercial Email)      
UCE, and      
ucspi-tcp      
UDP scan      
UDP scanning      2nd
uid, rsync option      
umask, ProFTPD setting      
unencrypted keys      
unencrypted server certificates      
Universal description, discovery, and integration (UDDI)      
unnecessary packages      
unpredictable behavior      
Unsolicited Commercial Email      [See UCE]
up-to-date, keeping software      
up2date      
updates      
updating automatically      
updating TripwireOs database after violation or system changes      
uploading files from forms      
use chroot, rsync option      
User      2nd
user accounts      [See accounts]
user directories      
user facility, syslog      
user keys      2nd
User, Apache option      
user-based      
user-based access control in Apache      
useradd, different behavior in      
useradd, Red Hat LinuxOs different behavior      
UseReverseDNS, ProFTPD setting      
username/password      2nd
username/password authentication      
use_cw_file      
using iptables for local security      
using to execute remote commands      
using to test SMTP servers      
utilities      [See syslog syslog-ng]
utilities, Bastille Linux      
UUCP      
uucp messages      
v8
v9
Venema, Wietse      2nd
Verb      
VERB, SMTP command      
VeriSign      2nd
version checking      
version differences      
version, BIND global option      
Versions      
versions that support      
versions, and      
versus      2nd
versus circuit relay proxies      
versus policy      
versus SMTP server with local user accounts      
view{} statements in      
view{} statements in named.conf file      
virtual domains      
virtual domains and Sendmail      
Virtual Private Networking      [See VPN]
virtual server setup      
virtual server setup, and      
virtusers      
virus scanners      
Vision, Max      
Vixie, Paul      
VLAD      
VPN (Virtual Private Networking)      
VRFY      
VRFY, SMTP command      
vulnerabilities      
vulnerability mitigation      
vulnerability of      
VulnWatch      
weak screened      
weak screened-subnet      
weaknesses      
Web      
Web Services Description Language (WSDL)      
Web Services Interoperability Group      
Web site      
WebDAV (Distributed Authoring and Versioning)      
Webmin      
WebNFS      2nd
well designed      
Window firewall scanning      
wn
wrapping data or packets      [See tunneling]
WU-FTPD      2nd
X Window System      
X Window System, and      
X.509      2nd
x.509 certificate authentication      
X.509 certificates      2nd
X11Forwarding      
xinetd      
xinetd, and      
xitami      
XML-based web services, alternatives      
XML-RPC      
Young, Eric A.      
your own systems for weaknesses      
Ziegler, Robert      
zlib, required by OpenSSH      
zone file security      
zone transfers      
zone-by-zone security      
zone{} section      
zone{} section in named.conf file      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте