Real World Linux Security (Prentice Hall Ptr Open Source Technology Series) - Softcover

Toxen, Bob

 
9780130464569: Real World Linux Security (Prentice Hall Ptr Open Source Technology Series)

Synopsis

It's not a question of "if" but "when." Will you be ready to protect your system when a cracker comes? Real World Linux Security goes beyond the books that merely detail system vulnerabilities by offering system administrators practical solutions for safeguarding Linux systems and actively responding to break-in attempts. Veteran Bob Toxen shows you how to know your enemies and stop them at the front gate, before they can damage your system. The book is organized into four sections: securing your system, preparing for an intrusion, detecting an intrusion, and recovering from an intrusion. Toxen even provides at-a-glance icons and tables rating the severity and likelihood of each type of attack. Along the way, you'll learn how to configure systems so they alter themselves to lock out a cracker -- and notify the sysadmin immediately -- at the first sign of attack. You'll discover virtually cracker-proof techniques for protecting credit card databases, even if your web server and network are compromised. Toxen also presents techniques for ensuring that, if a break-in does occur, damage will be minimal and a full recovery can happen fast. This fully updated Second Edition now covers IP tables, home, mobile, and wireless issues, and protecting your network from users as well as crackers.

"synopsis" may belong to another edition of this title.

About the Author

BOB TOXEN has 28 years of UNIX/Linux experience. One of the 162 recognized developers of Berkeley UNIX, he learned about security as a student at UC Berkeley, where he cracked several of the original UNIX systems there. He is now President of Fly-By-Day Consulting, specializing in Linux and network security, firewalls, VPNs, 24x7 network monitoring, response, and administration for clients worldwide. In 2002, his recommendations were included in a report on improving U.S. intelligence that was presented to President Bush at the President's request. Toxen currently works with the U.S. Centers for Disease Control and Prevention to combat bioterrorism.

From the Back Cover

"You have in your hands a book I've been waiting to read for years―a practical, hands-on guide to hardening your Linux system."

―From the foreword by Eric S. Raymond

  • Safeguard your Linux systems against today's most vicious attacks!
  • Realistic, step-by-step techniques from one of the world's leading Linux security experts
  • Covers IP Tables, ARP attacks, adaptive firewalls, VPNs, wireless networks, Samba, monitoring, 2.4 kernel security, and much more
  • Quick and effective recovery from intrusions
  • Web site contains important new tools for monitoring networks and locking out hackers
"A comprehensive guide to system security: covers everything from hardening a system to system recovery after an attack."

―Steve Bourne, Creator of the Bourne Shell

Stop today's most vicious Internet attackers―right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks―and arm you with breakthrough resources for protecting yourself!

  • Surprising new IP Tables research every netadmin must know about
  • New techniques and software for detecting and blocking ARP and Switch attacks
  • Important enhancements to Linux-based adaptive firewalls
  • Thoroughly revised coverage of Samba security for Windows clients
  • 802.11b wireless networks security
  • How to make the most of Logcheck, Portsentry, and other new monitoring tools
  • VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more
  • Includes all-new chapter on physical security
  • Reviewed by some of the world's leading Linux security experts!
Web Site

The accompanying web site contains the author's own state-of-the-art software for instantly locking out hackers and alerting system administrators. The website contents also include exclusive IP Tables and IP Chains firewall scripts (rule sets), as well as powerful new tools for monitoring network health, detecting and reporting suspicious activities, securing backups, simplifying recovery, and much more.

"About this title" may belong to another edition of this title.