My Account Log in

2 options

How to cheat at securing Linux / Mohan Krishnamurthy ... [et al.].

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online
Format:
Book
Author/Creator:
Krishnamurthy Madwachar, Mohan.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Linux.
Physical Description:
1 online resource (433 p.)
Place of Publication:
Burlington, Mass. : Syngress, 2008.
Language Note:
English
Summary:
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Lin
Contents:
Front Cover; Securing Linux; Copyright Page; Contents; Chapter 1. Presenting the Business Case for Open Source Software; Introduction; The Costs of Using Free Security Solutions; The Savings of Using Free Security Solutions; Comparing Free Solutions with Commercial Solutions; ""Selling"" a Free Solution; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Hardening the Operating System; Introduction; Updating the Operating System; Handling Maintenance Issues; Manually Disabling Unnecessary Services and Ports; Locking Down Ports; Hardening the System with Bastille
Controlling and Auditing Root Access with SudoManaging Your Log Files; Using Logging Enhancers; Security Enhanced Linux; Securing Novell SUSE Linux; Novell AppArmor; Host Intrusion Prevention System; Linux Benchmark Tools; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Enumeration and Scanning Your Network; Introduction; Scanning; Enumeration; How Scanning Works; Open Source Tools; Summary; Frequently Asked Questions; Chapter 4. Introducing Intrusion Detection and Snort; Introduction; How an IDS Works; Where Snort Fits; Snort System Requirements
Exploring Snort's FeaturesUsing Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Installing and Configuring Snort and Add-Ons; Placing Your NIDS; Configuring Snort on Linux; Other Snort Add-Ons; Demonstrating Effectiveness; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Advanced Snort Deployment; Introduction; Monitoring the Network; Configuring Channel Bonding for Linux; Snort Rulesets; Plug-Ins; Preprocessor Plug-Ins; Detection Plug-Ins; Output Plug-Ins; Snort Inline
Solving Specific Security RequirementsSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Network Analysis, Troubleshooting, and Packet Sniffing; Introduction; What Is Network Analysis and Sniffing?; Who Uses Network Analysis?; How Does It Work?; Sniffing Wireless; Protocol Dissection; Protecting Against Sniffers; Network Analysis and Policy; Frequently Asked Questions; Chapter 8. Basics of Cryptography and Encryption; Introduction; Algorithms; Concepts of Using Cryptography; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 9. Perimeter Security, DMZs, Remote Access, and VPNsIntroduction; Firewall Types; Firewall Architectures; Implementing Firewalls; Providing Secure Remote Access; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Linux Bastion Hosts; Introduction; System Installation; Removing Optional Components; Additional Steps; Controlling Access to Resources; Auditing Access to Resources; Remote Administration; Bastion Host Configurations; Bastion Host Maintenance and Support; Linux Bastion Host Checklist; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 11. Apache Web Server Hardening
Notes:
Includes index.
ISBN:
1-281-32549-X
9786611325497
0-08-055868-2
OCLC:
437211968

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account