Авторизация
Поиск по указателям
Bauer M.D. — Linux Server Security
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Linux Server Security
Автор: Bauer M.D.
Аннотация: Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux — as a hub offering services to an organization or the Internet — and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell. Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic. A number of new security topics have been added for this edition, including:
* Database security, with a focus on MySQL
* Using OpenLDAP for authentication
* An introduction to email encryption
* The Cyrus IMAP service, a popular mail delivery agent
* The vsftpd FTP server
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Издание: 2-nd
Год издания: 2005
Количество страниц: 542
Добавлена в каталог: 14.06.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Public keys 2nd
public keys, adding to remote host
public services on a firewall
Public-key cryptography 2nd 3rd 4th
public-key cryptography, defined
public-key infrastructures 2nd 3rd
PUT method, HTTP
pwcheck_method, SASL variable
Python
Qmail 2nd
queries, database
QUIT command (SMTP)
r-services
Ranum, Marcus 2nd 3rd 4th 5th
Raptor
rbldns (djbdns component)
RC4
rcp, vulnerability of
RCPT command (SMTP)
read only, rsync option
Realtime Blackhole List
Recursion
recursion, BIND global option
recursion, caching servers and
recursion, disabling
recursion, in DNS
Red Hat
Red Hat Network
Red Hat Network, Redhat-Watch-list
Red Hat Network, rhn_register command
Red Hat, configuration preparation
Red Hat, disabling services in
Red Hat, OpenSSH and
Red Hat, useradd, different behavior in
Red Hat, whether to trust
redundant enforcement points
redundant system or network
refuse options, rsync option
register_globals, PHP variable
rejecting packets
remote administration tools [See VPN]
Remote Procedure Call [See RPC]
replication, database
Representational State Transfer (REST)
resource allocation in the DMZ
resource record
Responsible Person (RP) records
restricted access [See access restriction]
rhn_register command
rhosts authentication
Risk
risk, ALEs
risk, analysis, attack trees
risk, defined 2nd
rlogin, vulnerability of
rndc (Remote Name Daemon Control interface)
robots and spiders
rootkits
rootkits, detecting
routers
Rowland, Craig
RPC (Remote Procedure Call)
RPC, RPC scan
RPC, scanning
rpcbind [See portmapper service]
rpc_decode (Snort preprocessor plug-in)
rpm (RPM Package Manager)
RPM, digital signatures and
RPM, manual updates
RPM, OpenSSH and
RPM, package dependencies
RPM, package version checking
RPM, security updates and
rpm-python
RSA
RSA Crypto FAQ
RSA, authentication 2nd
RSA, certificates
RSA, keys
RSA, keys, OpenSSH and
RSA, RSA/DSA
RSA, SSH transactions and
rsh, vulnerability of
rsync 2nd 3rd
rsync, anonymous rsync
rsync, connecting a client to an rsync server
rsync, encrypting zone transfers with
rsync, example
rsync, getting, compiling, and installing
rsync, global settings
rsync, home page
rsync, module
rsync, server setup
rsync, sessions example
rsync, tunneling with Stunnel
rsyncd.conf file
Rule Specifications
S/KEY
S/MIME 2nd
safe_mysqld script
SAINT
Salt
Samba 2nd 3rd
SASL (simple authentication and security layer) 2nd
SASL, client-sever authentication, for
SASL, configuring
SASL, configuring to use LDAP directly
SASL, configuring to use LDAP via PAM
SASL, methods
SASL, obtaining Cyrus SASL
SASL, server-server authentication, for
saslauthd
sasldb, SASL method
scan types
scan types, stealth 2nd
Scanners
scanners, security [See Nessus nmap Snort]
scanners, signature
Scanning
scanning, attackers scanning ranges of IP addresses
scanning, options, OS fingerprinting
scanning, tools 2nd [See also scanners]
Scheidler, Balazs 2nd 3rd
Schneier, Bruce 2nd
scp, SSH tool 2nd 3rd
screened-subnet architecture
Script kiddies 2nd
Second Generation Web Services
secrets file, rsync option
Secure
secure FTP (sftp)
Secure Shell [See SSH]
Secure Shell Daemon [See sshd]
Secure Sockets Layer [See SSL]
secure, data transmission
secure, Telnet
SecureInetd.pm, InteractiveBastille module
securing web servers [See web servers securing]
Security 2nd 3rd
security, data confidentiality
Security, data integrity
security, database [See database security]
security, explained
security, free
security, in depth
security, patches
security, planning
security, scans
security, system integrity
security, system/network availability
security, updates
security-advisory email lists
security-advisory email lists, VulnWatch
security-announcement mailing lists
SELECT ... INTO OUTFILE command
sendmail 2nd 3rd
Sendmail Restricted Shell (smrsh)
Sendmail, access database
Sendmail, aliases
Sendmail, antispam features
Sendmail, architecture
Sendmail, black hole list
Sendmail, blacklist_recipients
Sendmail, btree
Sendmail, built-in security features in
Sendmail, client-server authentication, for
Sendmail, configuration file [See sendmail.cf file]
Sendmail, configuring
Sendmail, configuring to use TLS
Sendmail, database formats
Sendmail, dbm
Sendmail, determining supported formats
Sendmail, EXPOSED_USER
Sendmail, files 2nd
Sendmail, getting and installing
Sendmail, mailertable feature
Sendmail, MASQUERADE_AS macro
Sendmail, MASQUERADE_DOMAIN macro
Sendmail, MASQUERADE_DOMAIN_FILE macro
Sendmail, masquerade_entire_domain
Sendmail, masquerade_envelope
Sendmail, nouucp directive
Sendmail, overview
Sendmail, privacy flags
Sendmail, pros and cons
Sendmail, Sendmail
Sendmail, server-server authentication, for
Sendmail, SMTP relays
Sendmail, SMTP STARTTLS in sendmail/Secure Switch
Sendmail, to run semichrooted
Sendmail, use_cw_file
Sendmail, using SMTP AUTH in
Sendmail, virtual domains
Sendmail, virtusertable
sendmail.cf file 2nd 3rd
sendmail.cf file, applying new configuration
sendmail.mc directives
sendmail.mc file
sendmail.mc file, comment
sendmail.mc file, feature
sendmail.mc file, m4 variable definitions
sendmail.mc file, mailer
sendmail.mc file, masquerading 2nd
Sendmail.pm, InteractiveBastille module
server compromise
server, unencrypted keys
Server-Side Includes (SSI)
ServerIdent, ProFTPD setting
ServerName, ProFTPD setting
ServerRoot, Apache option
ServerType, ProFTPD setting
Services
services, disabling in Debian
services, disabling in Red Hat
services, disabling in SUSE Linux
session keys 2nd
sessions and cookies explained
set group-ID (SGID)
set user-ID (SUID)
sftp (secure FTP)
sftp, SSH tool 2nd
SGID (set group-ID)
Sguil
Shamir, Adi
Shapiro, Gregory Neil
shosts authentication
SHOW VARIABLES command
Sidewinder
signatures
signatures, anomaly detection systems and
signatures, GPG
signatures, signature-based systems
Simple Authentication and Security Layer [See SASL]
Simple Mail Transfer Protocol [See SMTP]
simple packet filtering
simple port scans 2nd
single-port TCP service
site maintenance
slapd
slapd, certificates for
slapd, configuring and starting
slapd, package
slapd, startup options for TLS
slapd.conf file
slapd.conf file, parameters
slappasswd command
slashdot.org
SMB (CIFS) [See Samba]
SMTP (Simple Mail Transfer Protocol)
SMTP AUTH
SMTP AUTH, email relay access and
SMTP AUTH, using in Sendmail 8.10
SMTP, commands
SMTP, commands, DATA
SMTP, commands, HELO
SMTP, commands, MAIL
SMTP, commands, QUIT
SMTP, commands, RCPT
SMTP, database and SMTP gateways
SMTP, EXPN
SMTP, gateways
SMTP, headers
SMTP, mail logs
SMTP, mailertable sample
SMTP, open relays
SMTP, resources
SMTP, RFC 2821
SMTP, server-server relaying
SMTP, SMTP targeted
SMTP, STARTTLS in sendmail/Secure Switch
SMTP, testing
SMTP, VERB
SMTP, versus SMTP server with local user accounts
SMTP, VRFY
Snort 2nd
snort command
Snort, alert log
Snort, Analysis Console for Intrusion Databases (ACID) front end
Snort, analysis tools
Snort, Barnyard and
Snort, compiling and installing from source
Snort, configuration files
Snort, creating a database for
Snort, IDS Mode
Snort, installing
Snort, obtaining, compiling, and installing
Snort, official web site
Snort, Oinkmaster
Snort, OpenAanval web-based console
Snort, packet logger, using as a
Snort, packet sniffer, using as a
Snort, preprocessor plug-ins
Snort, primitives and
Snort, rule set
Snort, rules download
Snort, rules, include statements and
Snort, Sguil front end
Snort, starting in
Snort, Swatch and
Snort, testing and watching logs
Реклама