A tutorial guide to securing your system using LINUX-based open source tools. Covers account and password security, e-mail and directory security, intrusion detection, how to design and implement a firewall.
"synopsis" may belong to another edition of this title.
In their introduction, the authors of Linux System Security acknowledge that there's no magic bullet as far as security is concerned. Security-minded system administration is a process of constant revision. They promise, though, that "if you follow the procedures outlined in this book, you will certainly reduce your level of vulnerability". They deliver on that promise in spades. Using Red Hat Linux as their demonstration environment, the authors explain how to use a suite of publicly available tools to analyse, protect and monitor your machines and networks. They approach their subject from a practical standpoint, emphasising software and its use while referring the reader (with copious bibliographic notes) to more specialised works for more detailed information on cryptography, firewall configuration and other subjects.
Scott Mann and Ellen Mitchell have done excellent work in combining explanations of the "soft" aspects of security management with the particulars of using software. In a typical section, they explain how to acquire, install and run Crack, a password breaker. They first show how a bad guy would use Crack to gain unauthorised access to a machine over a network, then get into the "white hat" applications of the program as a security tool for pre-emptively weeding out weak passwords. More detailed coverage goes to tiger and Tripwire, a pair of powerful auditing and monitoring tools. Along with Maximum Linux Security (which covers more offensive and defensive weapons in less detail), this is one of the two best Linux security books you can own. --David Wall
Topics covered: Linux security practices and tools, as demonstrated under Red Hat Linux 5.2 and 6.0. Covered software and commands include Pluggable Authentication Modules (PAM), OPIE, syslog, sudo, xinetd, Secure Shell (SSH), Crack, tiger, Tripwire, The Cryptographic Filesystem (TCFS), and ipchains. The authors discuss administrative policies and procedures along the way.From the Back Cover:
Lock down your Linux system NOW!
Now there's an up-to-the-minute, hands-on guide to using open source tools to protect any Linux system! Completely updated for the newest tools and distributions, Linux System Security, Second Edition covers virtually every facet of Linux security, from firewalls and intrusion detection to authentication and secure Web services. You'll master over a dozen crucial open source security tools, including sudo, portmap, xinetd, tiger, tripwire, ipchains, pam, crack, and more. Along the way, three long-time Linux sysadmins will show you the "gotchas," rules of thumb, and undocumented tricks it would take you years to learn on your own!
Want the benefits of Linux without the security risks? Get Linux System Security, Second Edition!
Prentice Hall Series on Computer Networking and Distributed Systems, Radia Perlman, Series Advisor
"About this title" may belong to another edition of this title.
Book Description Pearson Education, 2002. Hardcover. Book Condition: New. 2. Bookseller Inventory # DADAX0130470112
Book Description Pearson Education, 2002. Hardcover. Book Condition: New. Bookseller Inventory # P110130470112
Book Description Pearson Education, 2002. Hardcover. Book Condition: New. book. Bookseller Inventory # 0130470112
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97801304701191.0
Book Description Pearson Education, 2002. Hardcover. Book Condition: New. New item. Bookseller Inventory # QX-005-21-2235102
Book Description Pearson Education, 2002. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service!. Bookseller Inventory # ABE_book_new_0130470112