Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Bauer M.D. — Linux Server Security
Bauer M.D. — Linux Server Security



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux Server Security

Автор: Bauer M.D.

Аннотация:

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux — as a hub offering services to an organization or the Internet — and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell. Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic. A number of new security topics have been added for this edition, including:

* Database security, with a focus on MySQL
* Using OpenLDAP for authentication
* An introduction to email encryption
* The Cyrus IMAP service, a popular mail delivery agent
* The vsftpd FTP server


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2-nd

Год издания: 2005

Количество страниц: 542

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Public keys      2nd
public keys, adding to remote host      
public services on a firewall      
Public-key cryptography      2nd 3rd 4th
public-key cryptography, defined      
public-key infrastructures      2nd 3rd
PUT method, HTTP      
pwcheck_method, SASL variable      
Python      
Qmail      2nd
queries, database      
QUIT command (SMTP)      
r-services      
Ranum, Marcus      2nd 3rd 4th 5th
Raptor      
rbldns (djbdns component)      
RC4      
rcp, vulnerability of      
RCPT command (SMTP)      
read only, rsync option      
Realtime Blackhole List      
Recursion      
recursion, BIND global option      
recursion, caching servers and      
recursion, disabling      
recursion, in DNS      
Red Hat      
Red Hat Network      
Red Hat Network, Redhat-Watch-list      
Red Hat Network, rhn_register command      
Red Hat, configuration preparation      
Red Hat, disabling services in      
Red Hat, OpenSSH and      
Red Hat, useradd, different behavior in      
Red Hat, whether to trust      
redundant enforcement points      
redundant system or network      
refuse options, rsync option      
register_globals, PHP variable      
rejecting packets      
remote administration tools      [See VPN]
Remote Procedure Call      [See RPC]
replication, database      
Representational State Transfer (REST)      
resource allocation in the DMZ      
resource record      
Responsible Person (RP) records      
restricted access      [See access restriction]
rhn_register command      
rhosts authentication      
Risk      
risk, ALEs      
risk, analysis, attack trees      
risk, defined      2nd
rlogin, vulnerability of      
rndc (Remote Name Daemon Control interface)      
robots and spiders      
rootkits      
rootkits, detecting      
routers      
Rowland, Craig      
RPC (Remote Procedure Call)      
RPC, RPC scan      
RPC, scanning      
rpcbind      [See portmapper service]
rpc_decode (Snort preprocessor plug-in)      
rpm (RPM Package Manager)      
RPM, digital signatures and      
RPM, manual updates      
RPM, OpenSSH and      
RPM, package dependencies      
RPM, package version checking      
RPM, security updates and      
rpm-python      
RSA      
RSA Crypto FAQ      
RSA, authentication      2nd
RSA, certificates      
RSA, keys      
RSA, keys, OpenSSH and      
RSA, RSA/DSA      
RSA, SSH transactions and      
rsh, vulnerability of      
rsync      2nd 3rd
rsync, anonymous rsync      
rsync, connecting a client to an rsync server      
rsync, encrypting zone transfers with      
rsync, example      
rsync, getting, compiling, and installing      
rsync, global settings      
rsync, home page      
rsync, module      
rsync, server setup      
rsync, sessions example      
rsync, tunneling with Stunnel      
rsyncd.conf file      
Rule Specifications      
S/KEY      
S/MIME      2nd
safe_mysqld script      
SAINT      
Salt      
Samba      2nd 3rd
SASL (simple authentication and security layer)      2nd
SASL, client-sever authentication, for      
SASL, configuring      
SASL, configuring to use LDAP directly      
SASL, configuring to use LDAP via PAM      
SASL, methods      
SASL, obtaining Cyrus SASL      
SASL, server-server authentication, for      
saslauthd      
sasldb, SASL method      
scan types      
scan types, stealth      2nd
Scanners      
scanners, security      [See Nessus nmap Snort]
scanners, signature      
Scanning      
scanning, attackers scanning ranges of IP addresses      
scanning, options, OS fingerprinting      
scanning, tools      2nd [See also scanners]
Scheidler, Balazs      2nd 3rd
Schneier, Bruce      2nd
scp, SSH tool      2nd 3rd
screened-subnet architecture      
Script kiddies      2nd
Second Generation Web Services      
secrets file, rsync option      
Secure      
secure FTP (sftp)      
Secure Shell      [See SSH]
Secure Shell Daemon      [See sshd]
Secure Sockets Layer      [See SSL]
secure, data transmission      
secure, Telnet      
SecureInetd.pm, InteractiveBastille module      
securing web servers      [See web servers securing]
Security      2nd 3rd
security, data confidentiality      
Security, data integrity      
security, database      [See database security]
security, explained      
security, free      
security, in depth      
security, patches      
security, planning      
security, scans      
security, system integrity      
security, system/network availability      
security, updates      
security-advisory email lists      
security-advisory email lists, VulnWatch      
security-announcement mailing lists      
SELECT ... INTO OUTFILE command      
sendmail      2nd 3rd
Sendmail Restricted Shell (smrsh)      
Sendmail, access database      
Sendmail, aliases      
Sendmail, antispam features      
Sendmail, architecture      
Sendmail, black hole list      
Sendmail, blacklist_recipients      
Sendmail, btree      
Sendmail, built-in security features in      
Sendmail, client-server authentication, for      
Sendmail, configuration file      [See sendmail.cf file]
Sendmail, configuring      
Sendmail, configuring to use TLS      
Sendmail, database formats      
Sendmail, dbm      
Sendmail, determining supported formats      
Sendmail, EXPOSED_USER      
Sendmail, files      2nd
Sendmail, getting and installing      
Sendmail, mailertable feature      
Sendmail, MASQUERADE_AS macro      
Sendmail, MASQUERADE_DOMAIN macro      
Sendmail, MASQUERADE_DOMAIN_FILE macro      
Sendmail, masquerade_entire_domain      
Sendmail, masquerade_envelope      
Sendmail, nouucp directive      
Sendmail, overview      
Sendmail, privacy flags      
Sendmail, pros and cons      
Sendmail, Sendmail      
Sendmail, server-server authentication, for      
Sendmail, SMTP relays      
Sendmail, SMTP STARTTLS in sendmail/Secure Switch      
Sendmail, to run semichrooted      
Sendmail, use_cw_file      
Sendmail, using SMTP AUTH in      
Sendmail, virtual domains      
Sendmail, virtusertable      
sendmail.cf file      2nd 3rd
sendmail.cf file, applying new configuration      
sendmail.mc directives      
sendmail.mc file      
sendmail.mc file, comment      
sendmail.mc file, feature      
sendmail.mc file, m4 variable definitions      
sendmail.mc file, mailer      
sendmail.mc file, masquerading      2nd
Sendmail.pm, InteractiveBastille module      
server compromise      
server, unencrypted keys      
Server-Side Includes (SSI)      
ServerIdent, ProFTPD setting      
ServerName, ProFTPD setting      
ServerRoot, Apache option      
ServerType, ProFTPD setting      
Services      
services, disabling in Debian      
services, disabling in Red Hat      
services, disabling in SUSE Linux      
session keys      2nd
sessions and cookies explained      
set group-ID (SGID)      
set user-ID (SUID)      
sftp (secure FTP)      
sftp, SSH tool      2nd
SGID (set group-ID)      
Sguil      
Shamir, Adi      
Shapiro, Gregory Neil      
shosts authentication      
SHOW VARIABLES command      
Sidewinder      
signatures      
signatures, anomaly detection systems and      
signatures, GPG      
signatures, signature-based systems      
Simple Authentication and Security Layer      [See SASL]
Simple Mail Transfer Protocol      [See SMTP]
simple packet filtering      
simple port scans      2nd
single-port TCP service      
site maintenance      
slapd      
slapd, certificates for      
slapd, configuring and starting      
slapd, package      
slapd, startup options for TLS      
slapd.conf file      
slapd.conf file, parameters      
slappasswd command      
slashdot.org      
SMB (CIFS)      [See Samba]
SMTP (Simple Mail Transfer Protocol)      
SMTP AUTH      
SMTP AUTH, email relay access and      
SMTP AUTH, using in Sendmail 8.10      
SMTP, commands      
SMTP, commands, DATA      
SMTP, commands, HELO      
SMTP, commands, MAIL      
SMTP, commands, QUIT      
SMTP, commands, RCPT      
SMTP, database and SMTP gateways      
SMTP, EXPN      
SMTP, gateways      
SMTP, headers      
SMTP, mail logs      
SMTP, mailertable sample      
SMTP, open relays      
SMTP, resources      
SMTP, RFC 2821      
SMTP, server-server relaying      
SMTP, SMTP targeted      
SMTP, STARTTLS in sendmail/Secure Switch      
SMTP, testing      
SMTP, VERB      
SMTP, versus SMTP server with local user accounts      
SMTP, VRFY      
Snort      2nd
snort command      
Snort, alert log      
Snort, Analysis Console for Intrusion Databases (ACID) front end      
Snort, analysis tools      
Snort, Barnyard and      
Snort, compiling and installing from source      
Snort, configuration files      
Snort, creating a database for      
Snort, IDS Mode      
Snort, installing      
Snort, obtaining, compiling, and installing      
Snort, official web site      
Snort, Oinkmaster      
Snort, OpenAanval web-based console      
Snort, packet logger, using as a      
Snort, packet sniffer, using as a      
Snort, preprocessor plug-ins      
Snort, primitives and      
Snort, rule set      
Snort, rules download      
Snort, rules, include statements and      
Snort, Sguil front end      
Snort, starting in      
Snort, Swatch and      
Snort, testing and watching logs      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте